Search results for keyword 'privacy'

1. Accountability and Transparency

...o ADP provides information as to how we handle personal data in the relevant privacy statement that is made available to our clients’ employees, consumers or job applicants....

Published by ADP

1. Accountability and Transparency

...o ADP provides information as to how we handle personal data in the relevant privacy statement that is made available to our clients’ employees, consumers or job applicants....

Published by ADP

2. Privacy Principles Privacy by Design

...privacy Principles privacy by Design...

Published by ADP

2. Privacy Principles Privacy by Design

...privacy Principles privacy by Design...

Published by ADP

2. Privacy Principles Privacy by Design

...o We have implemented an enterprise wide privacy by Design approach that incorporates privacy and data security into our ML and associated data processing systems....

Published by ADP

2. Privacy Principles Privacy by Design

...o We have implemented an enterprise wide privacy by Design approach that incorporates privacy and data security into our ML and associated data processing systems....

Published by ADP

2. Privacy Principles Privacy by Design

...Our ML models seek to minimize access to identifiable information to ensure we are using only the personal data we need to generate insights....

Published by ADP

2. Privacy Principles Privacy by Design

...ADP is committed to providing individuals with a reasonable opportunity to examine their own personal data and to update it if it is incorrect....

Published by ADP

· Article 7: Protect privacy.

...· Article 7: Protect privacy....

Published by Artificial Intelligence Industry Alliance (AIIA), China

· Article 7: Protect privacy.

...Adhere to the principles of legality, legitimacy, and necessity when collecting and using personal information....

Published by Artificial Intelligence Industry Alliance (AIIA), China

· Article 7: Protect privacy.

...Strengthen privacy protection for special data subjects such as minors....

Published by Artificial Intelligence Industry Alliance (AIIA), China

· Article 11: Formulate standards.

...Enhance the measurability of ethical principles such as security and controllability, transparency and explainability, privacy protection, and diversity and inclusiveness; and simultaneously build corresponding assessment capabilities....

Published by Artificial Intelligence Industry Alliance (AIIA), China

3. Security and Safety

...Security refers to ensuring the cybersecurity of AI systems, which includes mechanisms against malicious attacks specific to AI such as data poisoning, model inversion, the tampering of datasets, byzantine attacks in federated learning5, as well as other attacks designed to reverse engineer personal data used to train the AI....

Published by ASEAN

4. Human centricity

...personal data Protection Commission of Singapore’s (PDPC) Guide on Job Redesign in the Age of AI6 provides useful guidance to assist organisations in considering the impact of AI on its employees, and how work tasks can be redesigned to help employees embrace AI and move towards higher value tasks....

Published by ASEAN

4. Human centricity

...Personal data protection Commission of Singapore’s (PDPC) Guide on Job Redesign in the Age of AI6 provides useful guidance to assist organisations in considering the impact of AI on its employees, and how work tasks can be redesigned to help employees embrace AI and move towards higher value tasks....

Published by ASEAN

5. Privacy and Data Governance

...privacy and Data Governance...

Published by ASEAN

5. Privacy and Data Governance

...AI systems should have proper mechanisms in place to ensure data privacy and protection and maintain and protect the quality and integrity of data throughout their entire lifecycle....

Published by ASEAN

5. Privacy and Data Governance

...Data privacy and protection should be respected and upheld during the design, development, and deployment of AI systems....

Published by ASEAN

5. Privacy and Data Governance

...The way data is collected, stored, generated, and deleted throughout the AI system lifecycle must comply with applicable data protection laws, data governance legislation, and ethical principles....

Published by ASEAN

5. Privacy and Data Governance

...Some data protection and privacy laws in ASEAN include Malaysia’s personal data Protection Act 2010, the Philippines’ Data Privacy Act of 2012, Singapore’s personal data Protection Act 2012, Thailand’s personal data Protection Act 2019, Indonesia’s personal data Protection Law 2022, and Vietnam’s personal data Protection Decree 2023....

Published by ASEAN

5. Privacy and Data Governance

...Some data protection and privacy laws in ASEAN include Malaysia’s Personal data protection Act 2010, the Philippines’ Data Privacy Act of 2012, Singapore’s Personal data protection Act 2012, Thailand’s Personal data protection Act 2019, Indonesia’s Personal data protection Law 2022, and Vietnam’s Personal data protection Decree 2023....

Published by ASEAN

5. Privacy and Data Governance

...Some data protection and privacy laws in ASEAN include Malaysia’s Personal Data Protection Act 2010, the Philippines’ Data privacy Act of 2012, Singapore’s Personal Data Protection Act 2012, Thailand’s Personal Data Protection Act 2019, Indonesia’s Personal Data Protection Law 2022, and Vietnam’s Personal Data Protection Decree 2023....

Published by ASEAN

5. Privacy and Data Governance

...Some data protection and privacy laws in ASEAN include Malaysia’s Personal Data Protection Act 2010, the Philippines’ Data privacy Act of 2012, Singapore’s Personal Data Protection Act 2012, Thailand’s Personal Data Protection Act 2019, Indonesia’s Personal Data Protection Law 2022, and Vietnam’s Personal Data Protection Decree 2023....

Published by ASEAN

5. Privacy and Data Governance

...Organisations should ensure that necessary consent is obtained from individuals before collecting, using, or disclosing personal data for AI development and deployment, or otherwise have appropriate legal basis to collect, use or disclose personal data without consent....

Published by ASEAN

5. Privacy and Data Governance

...data protection and governance frameworks should be set up and adhered to by developers and deployers of AI systems....

Published by ASEAN

5. Privacy and Data Governance

...These frameworks should also be periodically reviewed and updated in accordance with applicable privacy and data protection laws....

Published by ASEAN

5. Privacy and Data Governance

...These frameworks should also be periodically reviewed and updated in accordance with applicable privacy and data protection laws....

Published by ASEAN

5. Privacy and Data Governance

...For example, data protection impact assessments (DPIA) help organisations determine how data processing systems, procedures, or technologies affect individuals’ privacy and eliminate risks that might violate compliance7....

Published by ASEAN

5. Privacy and Data Governance

...For example, data protection impact assessments (DPIA) help organisations determine how data processing systems, procedures, or technologies affect individuals’ privacy and eliminate risks that might violate compliance7....

Published by ASEAN

5. Privacy and Data Governance

...Developers and deployers of AI systems should also incorporate a privacy by design principle when developing and deploying AI systems....

Published by ASEAN

5. Privacy and Data Governance

...privacy by design is an approach that embeds privacy in every stage of the system development lifecycle....

Published by ASEAN

5. Privacy and Data Governance

...privacy by design is an approach that embeds privacy in every stage of the system development lifecycle....

Published by ASEAN

5. Privacy and Data Governance

...Data privacy is essential in gaining the public’s trust in technological advances....

Published by ASEAN

5. Privacy and Data Governance

...Another consideration is investing in privacy enhancing technologies to preserve privacy while allowing personal data to be used for innovation....

Published by ASEAN

5. Privacy and Data Governance

...Another consideration is investing in privacy enhancing technologies to preserve privacy while allowing personal data to be used for innovation....

Published by ASEAN

5. Privacy and Data Governance

...Another consideration is investing in privacy enhancing technologies to preserve privacy while allowing personal data to be used for innovation....

Published by ASEAN

5. Privacy and Data Governance

...privacy enhancing technologies include, but are not limited to, differential privacy, where small changes are made to raw data to securely de identify inputs without having a significant impact on the results of the AI system, and zero knowledge proofs (ZKP), where ZKP hide the underlying data and answer simple questions about whether something is true or false without revealing additional information...

Published by ASEAN

5. Privacy and Data Governance

...privacy enhancing technologies include, but are not limited to, differential privacy, where small changes are made to raw data to securely de identify inputs without having a significant impact on the results of the AI system, and zero knowledge proofs (ZKP), where ZKP hide the underlying data and answer simple questions about whether something is true or false without revealing additional information...

Published by ASEAN

2. RELIABILITY, SECURITY AND PRIVACY

...RELIABILITY, SECURITY AND privacy...

Published by the Law, Society and Ethics Working Group of the AI Forum,New Zealand

2. RELIABILITY, SECURITY AND PRIVACY

...AI stakeholders must ensure AI systems and related data are reliable, accurate and secure and the privacy of individuals is protected throughout the AI system’s life cycle, with potential risks identified and managed on an ongoing basis....

Published by the Law, Society and Ethics Working Group of the AI Forum,New Zealand

Right to privacy and data protection.

... Right to privacy and data protection....

Published by OFFICE OF THE CHIEF OF MINISTERS UNDERSECRETARY OF INFORMATION TECHNOLOGIES

Right to privacy and data protection.

... Right to privacy and data protection....

Published by OFFICE OF THE CHIEF OF MINISTERS UNDERSECRETARY OF INFORMATION TECHNOLOGIES

Privacy protection and security

... privacy protection and security...

Published by Department of Industry, Innovation and Science, Australian Government

Privacy protection and security

...Throughout their lifecycle, AI systems should respect and uphold privacy rights and data protection, and ensure the security of data....

Published by Department of Industry, Innovation and Science, Australian Government

Privacy protection and security

...Throughout their lifecycle, AI systems should respect and uphold privacy rights and data protection, and ensure the security of data....

Published by Department of Industry, Innovation and Science, Australian Government

Privacy protection and security

...This principle aims to ensure respect for privacy and data protection when using AI systems....

Published by Department of Industry, Innovation and Science, Australian Government

Privacy protection and security

...This principle aims to ensure respect for privacy and data protection when using AI systems....

Published by Department of Industry, Innovation and Science, Australian Government

Privacy protection and security

...For example, maintaining privacy through appropriate data anonymisation where used by AI systems....

Published by Department of Industry, Innovation and Science, Australian Government

· For Humanity

...Human privacy, dignity, freedom, autonomy and rights should be sufficiently respected....

Published by Beijing Academy of Artificial Intelligence (BAAI); Peking University; Tsinghua University; Institute of Automation, Chinese Academy of Sciences; Institute of Computing Technology, Chinese Academy of Sciences; Artifical Intelligence Industry Innovation Strategy Alliance (AITISA); etc.

· Privacy protection

...· privacy protection...

Published by Beijing Academy of Artificial Intelligence (BAAI), Peking University, Tsinghua University and the Chinese Academy of Sciences, together with enterprises that focus on AI development.

· Privacy protection

...The development of AI should protect children's privacy in a much stricter manner....

Published by Beijing Academy of Artificial Intelligence (BAAI), Peking University, Tsinghua University and the Chinese Academy of Sciences, together with enterprises that focus on AI development.

Transparency Principle

...The elements of the Transparency Principle can be found in several modern privacy laws, including the US Privacy Act, the EU data protection Directive, the GDPR, and the Council of Europe Convention 108....

Published by Center for AI and Digital Policy

Transparency Principle

...The elements of the Transparency Principle can be found in several modern privacy laws, including the US privacy Act, the EU Data Protection Directive, the GDPR, and the Council of Europe Convention 108....

Published by Center for AI and Digital Policy

Transparency Principle

...The elements of the Transparency Principle can be found in several modern privacy laws, including the US privacy Act, the EU Data Protection Directive, the GDPR, and the Council of Europe Convention 108....

Published by Center for AI and Digital Policy

Prohibition on Unitary Scoring

...In data protection law, universal identifiers that enable the profiling of individuals across are disfavored....

Published by Center for AI and Digital Policy

· Privacy and security

...· privacy and security...

Published by Centre for International Governance Innovation (CIGI), Canada

· Privacy and security

...Big data collection and AI must comply with laws that regulate privacy and data collection, use and storage....

Published by Centre for International Governance Innovation (CIGI), Canada

· Transparency

...In the absence of transparency regarding their algorithms’ purpose and actual effect, it is impossible to ensure that competition, labour, workplace safety, privacy and liability laws are being upheld....

Published by Centre for International Governance Innovation (CIGI), Canada

· (2) Education

...Literacy education provides the following contents: 1) Data used by AI are usually contaminated by bias, 2) AI is easy to generate unwanted bias in its use, and 3) The issues of impartiality, fairness, and privacy protection which are inherent to actual use of AI....

Published by Cabinet Office, Government of Japan

· (3) Privacy

...· (3) privacy...

Published by Cabinet Office, Government of Japan

· (3) Privacy

...This means, when utilizing AI, that more careful treatment of personal data is necessary than simply utilizing personal information....

Published by Cabinet Office, Government of Japan

· (3) Privacy

...This means, when utilizing AI, that more careful treatment of personal data is necessary than simply utilizing personal information....

Published by Cabinet Office, Government of Japan

· (3) Privacy

...To ensure that people are not suffered disadvantages from unexpected sharing or utilization of personal data through the internet for instance, each stakeholder must handle personal data based on the following principles....

Published by Cabinet Office, Government of Japan

· (3) Privacy

... Companies or government should not infringe individual person’s freedom, dignity and equality in utilization of personal data with AI technologies....

Published by Cabinet Office, Government of Japan

· (3) Privacy

... AI that uses personal data should have a mechanism that ensures accuracy and legitimacy and enable the person herself himself to be substantially involved in the management of her his privacy data....

Published by Cabinet Office, Government of Japan

· (3) Privacy

... AI that uses personal data should have a mechanism that ensures accuracy and legitimacy and enable the person herself himself to be substantially involved in the management of her his privacy data....

Published by Cabinet Office, Government of Japan

· (3) Privacy

...As a result, when using the AI, people can provide personal data without concerns and effectively benefit from the data they provide....

Published by Cabinet Office, Government of Japan

· (3) Privacy

... personal data must be properly protected according to its importance and sensitivity....

Published by Cabinet Office, Government of Japan

· (3) Privacy

...personal data varies from those unjust use of which would be likely to greatly affect rights and benefits of individuals (Typically thought and creed, medical history, criminal record, etc.)...

Published by Cabinet Office, Government of Japan

· (3) Privacy

...Taking this into consideration, we have to pay enough attention to the balance between the use and protection of personal data based on the common understanding of society and the cultural background....

Published by Cabinet Office, Government of Japan

· (7) Innovation

... To ensure the sound development of AI technology, it is necessary to establish an accessible platform in which data from all fields can be mutually utilized across borders with no monopolies, while ensuring privacy and security....

Published by Cabinet Office, Government of Japan

4. be as open as we can by sharing source code, training data, and other relevant information, all while protecting personal information, system integration, and national security and defence

... 4. be as open as we can by sharing source code, training data, and other relevant information, all while protecting personal information, system integration, and national security and defence...

Published by Government of Canada

Build a strong network and data security barrier.

...Jointly prevent the abuse of artificial intelligence technology and network attacks, and ensure personal privacy and data security in the development and application of artificial intelligence....

Published by China Africa Internet Development and Cooperation Forum

3.

...This governance should take into account the flexibility required for the rapid development of technology, while providing necessary protection for the rights of personal data, artificial intelligence users, and users whose works are used by artificial intelligence....

Published by China Government

We should gradually establish and improve relevant laws, regulations and rules, and ensure personal privacy and data security in the R&D and application of AI. We oppose theft, tampering, leaking, and other illegal collection and use of personal information.

... We should gradually establish and improve relevant laws, regulations and rules, and ensure personal privacy and data security in the R&D and application of AI....

Published by Cyberspace Administration of China

· Privacy protection

...· privacy protection...

Published by International Research Center for AI Ethics and Governance, Instituteof Automation, Chinese Academy of Sciences and other 10 entities

· Privacy protection

...In promoting the application and activities of AI for climate action, it is necessary to ensure people's rights to privacy and informed consent....

Published by International Research Center for AI Ethics and Governance, Instituteof Automation, Chinese Academy of Sciences and other 10 entities

· Privacy protection

...Personal privacy related data cannot be illegally obtained in the name of climate control....

Published by International Research Center for AI Ethics and Governance, Instituteof Automation, Chinese Academy of Sciences and other 10 entities

4. We are transparent.

...In addition, we make clear, how and to which extent they can choose the way of further processing their personal data....

Published by Deutsche Telekom

5. We are secure.

...We never process privacy relevant data without legal permission....

Published by Deutsche Telekom

5. We are secure.

...Additionally, we limit the usage to appropriate use cases and thoroughly secure our systems to obstruct external access and ensure data privacy....

Published by Deutsche Telekom

6. We set the framework.

...The essential paradigm for our AI systems’ impact analysis is “privacy und security by design”....

Published by Deutsche Telekom

III. Privacy and Data Governance

...privacy and Data Governance...

Published by European Commission

III. Privacy and Data Governance

...Privacy and data protection must be guaranteed at all stages of the AI system’s life cycle....

Published by European Commission

III. Privacy and Data Governance

...privacy and data protection must be guaranteed at all stages of the AI system’s life cycle....

Published by European Commission

III. Privacy and Data Governance

...In addition to safeguarding privacy and personal data, requirements must be fulfilled to ensure high quality AI systems....

Published by European Commission

III. Privacy and Data Governance

...In addition to safeguarding privacy and personal data, requirements must be fulfilled to ensure high quality AI systems....

Published by European Commission

(f) Rule of law and accountability

...This includes protections against risks stemming from ‘autonomous’ systems that could infringe human rights, such as safety and privacy....

Published by European Group on Ethics in Science and New Technologies, European Commission

(h) Data protection and privacy

... (h) data protection and privacy...

Published by European Group on Ethics in Science and New Technologies, European Commission

(h) Data protection and privacy

... (h) Data protection and privacy...

Published by European Group on Ethics in Science and New Technologies, European Commission

(h) Data protection and privacy

...In an age of ubiquitous and massive collection of data through digital communication technologies, the right to protection of personal information and the right to respect for privacy are crucially challenged....

Published by European Group on Ethics in Science and New Technologies, European Commission

(h) Data protection and privacy

...In an age of ubiquitous and massive collection of data through digital communication technologies, the right to protection of personal information and the right to respect for privacy are crucially challenged....

Published by European Group on Ethics in Science and New Technologies, European Commission

(h) Data protection and privacy

...Both physical AI robots as part of the Internet of Things, as well as AI softbots that operate via the World Wide Web must comply with data protection regulations and not collect and spread data or be run on sets of data for whose use and dissemination no informed consent has been given....

Published by European Group on Ethics in Science and New Technologies, European Commission

(h) Data protection and privacy

...In light of concerns with regard to the implications of ‘autonomous’ systems on private life and privacy, consideration may be given to the ongoing debate about the introduction of two new rights: the right to meaningful human contact and the right to not be profiled, measured, analysed, coached or nudged....

Published by European Group on Ethics in Science and New Technologies, European Commission

(Conclusion)

...Two important principles for consideration were purposefully left off of this list as they are well covered elsewhere: privacy and the impact of human experimentation....

Published by Fairness, Accountability, and Transparency in Machine Learning (FAT/ML)

· 12) Personal Privacy

...· 12) Personal privacy...

Published by Future of Life Institute (FLI), Beneficial AI 2017

· 13) Liberty and Privacy

...· 13) Liberty and privacy...

Published by Future of Life Institute (FLI), Beneficial AI 2017

· 13) Liberty and Privacy

...The application of AI to personal data must not unreasonably curtail people’s real or perceived liberty....

Published by Future of Life Institute (FLI), Beneficial AI 2017

· 1.2. Human centered values and fairness

...These include freedom, dignity and autonomy, privacy and data protection, non discrimination and equality, diversity, fairness, social justice, and internationally recognized labor rights....

Published by G20 Ministerial Meeting on Trade and Digital Economy

· 1.2. Human centered values and fairness

...These include freedom, dignity and autonomy, privacy and data protection, non discrimination and equality, diversity, fairness, social justice, and internationally recognized labor rights....

Published by G20 Ministerial Meeting on Trade and Digital Economy

· 1.4. Robustness, security and safety

...c) AI actors should, based on their roles, the context, and their ability to act, apply a systematic risk management approach to each phase of the AI system lifecycle on a continuous basis to address risks related to AI systems, including privacy, digital security, safety and bias....

Published by G20 Ministerial Meeting on Trade and Digital Economy

· 2.1. Investing in AI research and development

...b) Governments should also consider public investment and encourage private investment in open datasets that are representative and respect privacy and data protection to support an environment for AI research and development that is free of inappropriate bias and to improve interoperability and use of standards....

Published by G20 Ministerial Meeting on Trade and Digital Economy

· 2.1. Investing in AI research and development

...b) Governments should also consider public investment and encourage private investment in open datasets that are representative and respect privacy and data protection to support an environment for AI research and development that is free of inappropriate bias and to improve interoperability and use of standards....

Published by G20 Ministerial Meeting on Trade and Digital Economy

Be designed for the benefit, safety and privacy of the patient

... Be designed for the benefit, safety and privacy of the patient...

Published by GE Healthcare

Privacy

... privacy...

Published by Data Ethics Commission, Germany

Privacy

...The right to privacy is intended to preserve an individual’s freedom and the integrity of his or her personal identity....

Published by Data Ethics Commission, Germany

Privacy

...Potential threats to privacy include the wholesale collection and evaluation of data about even the most intimate of topics....

Published by Data Ethics Commission, Germany

· 5. Incorporate privacy design principles.

...Incorporate privacy design principles....

Published by Google

· 5. Incorporate privacy design principles.

...We will incorporate our privacy principles in the development and use of our AI technologies....

Published by Google

· 5. Incorporate privacy design principles.

...We will give opportunity for notice and consent, encourage architectures with privacy safeguards, and provide appropriate transparency and control over the use of data....

Published by Google

· (7) Privacy for Human

...· (7) privacy for Human...

Published by HAIP Initiative

· (7) Privacy for Human

...AI need to respect human privacy....

Published by HAIP Initiative

· (14) Privacy for AI

...· (14) privacy for AI...

Published by HAIP Initiative

· (14) Privacy for AI

...Human need to respect the privacy of AI, on the basis that AI does not bring any actual challenge for human safety....

Published by HAIP Initiative

· 2. The Principle of Non maleficence: “Do no Harm”

...By design, AI systems should protect the dignity, integrity, liberty, privacy, safety, and security of human beings in society and at work....

Published by The European Commission’s High-Level Expert Group on Artificial Intelligence

· 2. Data Governance

...Even if the data is handled in a privacy preserving way, there are requirements that have to be fulfilled in order to have high quality AI....

Published by The European Commission’s High-Level Expert Group on Artificial Intelligence

· 4. Governance of AI Autonomy (Human oversight)

...The correct approach to assuring properties such as safety, accuracy, adaptability, privacy, explicability, compliance with the rule of law and ethical conformity heavily depends on specific details of the AI system, its area of application, its level of impact on individuals, communities or society and its level of autonomy....

Published by The European Commission’s High-Level Expert Group on Artificial Intelligence

· 7. Respect for Privacy

...Respect for privacy...

Published by The European Commission’s High-Level Expert Group on Artificial Intelligence

· 7. Respect for Privacy

...Privacy and data protection must be guaranteed at all stages of the life cycle of the AI system....

Published by The European Commission’s High-Level Expert Group on Artificial Intelligence

· 7. Respect for Privacy

...privacy and data protection must be guaranteed at all stages of the life cycle of the AI system....

Published by The European Commission’s High-Level Expert Group on Artificial Intelligence

· 7. Respect for Privacy

...Organisations must be mindful of how data is used and might impact users, and ensure full compliance with the GDPR as well as other applicable regulation dealing with privacy and data protection....

Published by The European Commission’s High-Level Expert Group on Artificial Intelligence

· 7. Respect for Privacy

...Organisations must be mindful of how data is used and might impact users, and ensure full compliance with the GDPR as well as other applicable regulation dealing with privacy and data protection....

Published by The European Commission’s High-Level Expert Group on Artificial Intelligence

3. Artificial intelligence should not be used to diminish the data rights or privacy of individuals, families or communities.

...Artificial intelligence should not be used to diminish the data rights or privacy of individuals, families or communities....

Published by House of Lords of United Kingdom, Select Committee on Artificial Intelligence

3. Artificial intelligence should not be used to diminish the data rights or privacy of individuals, families or communities.

...The ways in which data is gathered and accessed need to be reconsidered, so that innovative companies, big and small, have fair and reasonable access to data, while citizens and consumers can also protect their privacy and personal agency in this changing world....

Published by House of Lords of United Kingdom, Select Committee on Artificial Intelligence

4. Protect the right of each person on the privacy of their data (sensitive personal information) and in the same way give ethical use to the information of each individual always with the prior consent of its owner. Each person's consent will be required regarding the use of the generation of new data created from the AI.

...Protect the right of each person on the privacy of their data (sensitive personal information) and in the same way give ethical use to the information of each individual always with the prior consent of its owner....

Published by IA Latam

4. Protect the right of each person on the privacy of their data (sensitive personal information) and in the same way give ethical use to the information of each individual always with the prior consent of its owner. Each person's consent will be required regarding the use of the generation of new data created from the AI.

...Protect the right of each person on the privacy of their data (sensitive personal information) and in the same way give ethical use to the information of each individual always with the prior consent of its owner....

Published by IA Latam

R Respect of privacy

... R Respect of privacy...

Published by Institute of Business Ethics (IBE)

R Respect of privacy

...The rise of AI has been described by some as the death of privacy, while others have compared it to an Orwellian Big Brother ready to scoop on everyone's private life....

Published by Institute of Business Ethics (IBE)

R Respect of privacy

...Certainly, machine learning technologies have brought about new ethical issues related to the respect of privacy....

Published by Institute of Business Ethics (IBE)

R Respect of privacy

...Recognising this, the European Commission reinforced the principle that everyone has the right to the protection of personal data by proposing a comprehensive reform of data protection rules (General Data Protection Regulation GDPR)....

Published by Institute of Business Ethics (IBE)

R Respect of privacy

...Recognising this, the European Commission reinforced the principle that everyone has the right to the protection of personal data by proposing a comprehensive reform of data protection rules (General data protection Regulation GDPR)....

Published by Institute of Business Ethics (IBE)

Declaration On Ethics And Data Protection In Artifical Intelligence

...Declaration On Ethics And data protection In Artifical Intelligence...

Published by 40th International Conference of Data Protection and Privacy Commissioners (ICDPPC)

(Preamble)

...The 40th International Conference of Data Protection and Privacy Commissioners considers that any creation, development and use of artificial intelligence systems shall fully respect human rights, particularly the rights to the protection of personal data and to privacy, as well as human dignity, non discrimination and fundamental values, and shall provide solutions to allow individuals to maintain control and understanding of artificial intelligence systems....

Published by 40th International Conference of Data Protection and Privacy Commissioners (ICDPPC)

(Preamble)

...The 40th International Conference of data protection and Privacy Commissioners considers that any creation, development and use of artificial intelligence systems shall fully respect human rights, particularly the rights to the protection of personal data and to privacy, as well as human dignity, non discrimination and fundamental values, and shall provide solutions to allow individuals to maintain control and understanding of artificial intelligence systems....

Published by 40th International Conference of Data Protection and Privacy Commissioners (ICDPPC)

(Preamble)

...The 40th International Conference of Data Protection and privacy Commissioners considers that any creation, development and use of artificial intelligence systems shall fully respect human rights, particularly the rights to the protection of personal data and to privacy, as well as human dignity, non discrimination and fundamental values, and shall provide solutions to allow individuals to maintain control and understanding of artificial intelligence systems....

Published by 40th International Conference of Data Protection and Privacy Commissioners (ICDPPC)

(Preamble)

...The 40th International Conference of Data Protection and privacy Commissioners considers that any creation, development and use of artificial intelligence systems shall fully respect human rights, particularly the rights to the protection of personal data and to privacy, as well as human dignity, non discrimination and fundamental values, and shall provide solutions to allow individuals to maintain control and understanding of artificial intelligence systems....

Published by 40th International Conference of Data Protection and Privacy Commissioners (ICDPPC)

3. Artificial intelligence systems transparency and intelligibility should be improved, with the objective of effective implementation, in particular by:

...d. guaranteeing the right to informational self determination, notably by ensuring that individuals are always informed appropriately when they are interacting directly with an artificial intelligence system or when they provide personal data to be processed by such systems,...

Published by 40th International Conference of Data Protection and Privacy Commissioners (ICDPPC)

4. As part of an overall “ethics by design” approach, artificial intelligence systems should be designed and developed responsibly, by applying the principles of privacy by default and privacy by design, in particular by:

...As part of an overall “ethics by design” approach, artificial intelligence systems should be designed and developed responsibly, by applying the principles of privacy by default and privacy by design, in particular by:...

Published by 40th International Conference of Data Protection and Privacy Commissioners (ICDPPC)

4. As part of an overall “ethics by design” approach, artificial intelligence systems should be designed and developed responsibly, by applying the principles of privacy by default and privacy by design, in particular by:

...As part of an overall “ethics by design” approach, artificial intelligence systems should be designed and developed responsibly, by applying the principles of privacy by default and privacy by design, in particular by:...

Published by 40th International Conference of Data Protection and Privacy Commissioners (ICDPPC)

4. As part of an overall “ethics by design” approach, artificial intelligence systems should be designed and developed responsibly, by applying the principles of privacy by default and privacy by design, in particular by:

...a. implementing technical and organizational measures and procedures – proportional to the type of system that is developed – to ensure that data subjects’ privacy and personal data are respected, both when determining the means of the processing and at the moment of data processing,...

Published by 40th International Conference of Data Protection and Privacy Commissioners (ICDPPC)

4. As part of an overall “ethics by design” approach, artificial intelligence systems should be designed and developed responsibly, by applying the principles of privacy by default and privacy by design, in particular by:

...a. implementing technical and organizational measures and procedures – proportional to the type of system that is developed – to ensure that data subjects’ privacy and personal data are respected, both when determining the means of the processing and at the moment of data processing,...

Published by 40th International Conference of Data Protection and Privacy Commissioners (ICDPPC)

5. Empowerment of every individual should be promoted, and the exercise of individuals’ rights should be encouraged, as well as the creation of opportunities for public engagement, in particular by:

...a. respecting data protection and privacy rights, including where applicable the right to information, the right to access, the right to object to processing and the right to erasure, and promoting those rights through education and awareness campaigns,...

Published by 40th International Conference of Data Protection and Privacy Commissioners (ICDPPC)

5. Empowerment of every individual should be promoted, and the exercise of individuals’ rights should be encouraged, as well as the creation of opportunities for public engagement, in particular by:

...a. respecting data protection and privacy rights, including where applicable the right to information, the right to access, the right to object to processing and the right to erasure, and promoting those rights through education and awareness campaigns,...

Published by 40th International Conference of Data Protection and Privacy Commissioners (ICDPPC)

6. Unlawful biases or discriminations that may result from the use of data in artificial intelligence should be reduced and mitigated, including by:

...c. taking reasonable steps to ensure the personal data and information used in automated decision making is accurate, up to date and as complete as possible, and...

Published by 40th International Conference of Data Protection and Privacy Commissioners (ICDPPC)

(Conclusion)

...Taking into consideration the principles above, the 40th International Conference of data protection and Privacy Commissioners calls for common governance principles on artificial intelligence to be established, fostering concerted international efforts in this field, in order to ensure that its development and use take place in accordance with ethics and human values, and respect human dignity....

Published by 40th International Conference of Data Protection and Privacy Commissioners (ICDPPC)

(Conclusion)

...Taking into consideration the principles above, the 40th International Conference of Data Protection and privacy Commissioners calls for common governance principles on artificial intelligence to be established, fostering concerted international efforts in this field, in order to ensure that its development and use take place in accordance with ethics and human values, and respect human dignity....

Published by 40th International Conference of Data Protection and Privacy Commissioners (ICDPPC)

· Independent Global AI Safety and Verification Research

...In addition to foundational AI safety research, these funds would focus on developing privacy preserving and secure verification methods, which act as enablers for domestic governance and international cooperation....

Published by IDAIS (International Dialogues on AI Safety)

1. Principle 1 — Human Rights

...Governance frameworks, including standards and regulatory bodies, should be established to oversee processes assuring that the use of A IS does not infringe upon human rights, freedoms, dignity, and privacy, and of traceability to contribute to the building of public trust in A IS....

Published by The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems

5. Principle 5 — A IS Technology Misuse and Awareness of It

...Providing ethics education and security awareness that sensitizes society to the potential risks of misuse of A IS (e.g., by providing “data privacy” warnings that some smart devices will collect their user’s personal data)....

Published by The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems

5. Principle 5 — A IS Technology Misuse and Awareness of It

...Providing ethics education and security awareness that sensitizes society to the potential risks of misuse of A IS (e.g., by providing “data privacy” warnings that some smart devices will collect their user’s personal data)....

Published by The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems

Data Agency

...A IS developers should respect each individual’s ability to maintain appropriate control over their personal data and identifying information....

Published by IEEE

· 2.4 Cybersecurity and Privacy

...· 2.4 Cybersecurity and privacy...

Published by Information Technology Industry Council (ITI)

· 2.4 Cybersecurity and Privacy

...Just like technologies that have come before it, AI depends on strong cybersecurity and privacy provisions....

Published by Information Technology Industry Council (ITI)

7 Privacy

... 7 privacy...

Published by International Technology Law Association (ITechLaw)

7 Privacy

...Organisations that develop, deploy or use AI systems and any national laws that regulate such use shall endeavour to ensure that AI systems are compliant with privacy norms and regulations, taking into account the unique characteristics of AI systems, and the evolution of standards on privacy....

Published by International Technology Law Association (ITechLaw)

7 Privacy

...Organisations that develop, deploy or use AI systems and any national laws that regulate such use shall endeavour to ensure that AI systems are compliant with privacy norms and regulations, taking into account the unique characteristics of AI systems, and the evolution of standards on privacy....

Published by International Technology Law Association (ITechLaw)

• Liberate Data Responsibly

...• Open public data: While protecting privacy, governments should make useful datasets publicly available when appropriate and provide guidance to startups and small and medium businesses for its reuse....

Published by Intel

• Rethink Privacy

... • Rethink privacy...

Published by Intel

• Rethink Privacy

...privacy approaches like The Fair Information Practice Principles and privacy by Design have withstood the test of time and the evolution of new technology....

Published by Intel

• Rethink Privacy

...privacy approaches like The Fair Information Practice Principles and privacy by Design have withstood the test of time and the evolution of new technology....

Published by Intel

• Rethink Privacy

...• Adopt Robust privacy Laws: Based on the OECD Fair Information Practice Principles....

Published by Intel

• Rethink Privacy

...• Implement privacy by Design: Follow Intel’s Rethinking privacy approach to implement privacy by Design into AI product and project development....

Published by Intel

• Rethink Privacy

...• Implement privacy by Design: Follow Intel’s Rethinking privacy approach to implement privacy by Design into AI product and project development....

Published by Intel

• Rethink Privacy

...• Implement privacy by Design: Follow Intel’s Rethinking privacy approach to implement privacy by Design into AI product and project development....

Published by Intel

Responsible Deployment

...privacy is key: AI systems must be data responsible....

Published by Internet Society, "Artificial Intelligence and Machine Learning: Policy Paper"

Responsible Deployment

...AI systems should only collect, use, share and store data in accordance with privacy and personal data laws and best practices....

Published by Internet Society, "Artificial Intelligence and Machine Learning: Policy Paper"

Responsible Deployment

...AI systems should only collect, use, share and store data in accordance with privacy and personal data laws and best practices....

Published by Internet Society, "Artificial Intelligence and Machine Learning: Policy Paper"

3. Respect for the privacy of others

...Respect for the privacy of others...

Published by The Japanese Society for Artificial Intelligence (JSAI)

3. Respect for the privacy of others

...Members of the JSAI will respect the privacy of others with regards to their research and development of AI....

Published by The Japanese Society for Artificial Intelligence (JSAI)

3. Respect for the privacy of others

...Members of the JSAI have the duty to treat personal information appropriately and in accordance with relevant laws and regulations....

Published by The Japanese Society for Artificial Intelligence (JSAI)

2. Principle of transparency

...AI systems which are supposed to be subject to this principle are such ones that might affect the life, body, freedom, privacy, or property of users or third parties....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

2. Principle of transparency

...In interpreting this principle, consideration to privacy and trade secrets is also required....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...Principle of privacy...

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...Developers should take it into consideration that AI systems will not infringe the privacy of users or third parties....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...The privacy referred to in this principle includes spatial privacy (peace of personal life), information privacy (personal data), and secrecy of communications....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...The privacy referred to in this principle includes spatial privacy (peace of personal life), information privacy (personal data), and secrecy of communications....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...The privacy referred to in this principle includes spatial privacy (peace of personal life), information privacy (personal data), and secrecy of communications....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...The privacy referred to in this principle includes spatial privacy (peace of personal life), information privacy (personal data), and secrecy of communications....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...Developers should consider international guidelines on privacy, such as “OECD Guidelines on the Protection of Privacy and Transborder Flows of personal data,” as well as the followings, with consideration of the possibility that AI systems might change their outputs or programs as a result of learning and other methods:...

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...Developers should consider international guidelines on privacy, such as “OECD Guidelines on the Protection of privacy and Transborder Flows of Personal Data,” as well as the followings, with consideration of the possibility that AI systems might change their outputs or programs as a result of learning and other methods:...

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...Developers should consider international guidelines on privacy, such as “OECD Guidelines on the Protection of privacy and Transborder Flows of Personal Data,” as well as the followings, with consideration of the possibility that AI systems might change their outputs or programs as a result of learning and other methods:...

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...● To make efforts to evaluate the risks of privacy infringement and conduct privacy impact assessment in advance....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...● To make efforts to evaluate the risks of privacy infringement and conduct privacy impact assessment in advance....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...● To make efforts to take necessary measures, to the extent possible in light of the characteristics of the technologies to be adopted throughout the process of development of the AI systems (“privacy by design”), to avoid infringement of privacy at the time of the utilization....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...● To make efforts to take necessary measures, to the extent possible in light of the characteristics of the technologies to be adopted throughout the process of development of the AI systems (“privacy by design”), to avoid infringement of privacy at the time of the utilization....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

1. Principle of proper utilization

...of damages caused by accidents, security breaches, privacy infringement, etc....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

3. Principle of collaboration

...• Risks of the infringement of privacy as a result of information sharing across fields and the concentration of information to one specific AI....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...Principle of privacy...

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...Users and data providers should take into consideration that the utilization of AI systems or AI services will not infringe on the privacy of users’ or others....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...A) Respect for the privacy of others...

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...With consideration of social contexts and reasonable expectations of people in the utilization of AI, users may be expected to respect the privacy of others in the utilization of AI....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...In addition, users may be expected to consider measures to be taken against privacy infringement caused by AI in advance....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...B) Respect for the privacy of others in the collection, analysis, provision, etc....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...of personal data...

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...Users and data providers may be expected to respect the privacy of others in the collection, analysis, provision, etc....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...of personal data used for learning or other methods of AI....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...C) Consideration for the privacy, etc....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...In the case of profiling by using AI in fields where the judgments of AI might have significant influences on individual rights and interests, such as the fields of personnel evaluation, recruitment, and financing, AI service providers and business users may be expected to pay due consideration to the privacy, etc....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...D) Attention to the infringement of the privacy of users’ or others...

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...E) Prevention of personal data leakage...

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Principle of privacy

...AI service providers, business users, and data providers may be expected to take appropriate measures so that personal data should not be provided by the judgments of AI to third parties without consent of the person....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

9. Principle of transparency

...In interpreting this principle, privacy of individuals and trade secrets of enterprises are also taken into account....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

6. Data Security and Privacy Protection

...Data Security and privacy Protection...

Published by Megvii

6. Data Security and Privacy Protection

...In the development and use of artificial intelligence solutions, users' personal privacy and data security need to be strictly protected....

Published by Megvii

Recommendations for the treatment of personal data derived from the use of Artificial Intelligence

...Recommendations for the treatment of personal data derived from the use of Artificial Intelligence...

Published by National Institute of Transparency, Access to Information and Protection of Personal Data (INAI)

Privacy & Security

... privacy & Security...

Published by Microsoft

Privacy & Security

...AI systems should be secure and respect privacy....

Published by Microsoft

4. Privacy

...privacy...

Published by University of Montreal, Forum on the Socially Responsible Development of AI

4. Privacy

...How can AI guarantee respect for personal privacy ?...

Published by University of Montreal, Forum on the Socially Responsible Development of AI

4. Privacy

...Do our personal data belong to us and should we have the right to delete them?...

Published by University of Montreal, Forum on the Socially Responsible Development of AI

4. Privacy

...Should we know with whom our personal data are shared and, more generally, who is using these data?...

Published by University of Montreal, Forum on the Socially Responsible Development of AI

4. Privacy

...​The development of AI should offer guarantees respecting personal privacy and allowing people who use it to access their personal data as well as the kinds of information that any algorithm might use....

Published by University of Montreal, Forum on the Socially Responsible Development of AI

4. Privacy

...​The development of AI should offer guarantees respecting personal privacy and allowing people who use it to access their personal data as well as the kinds of information that any algorithm might use....

Published by University of Montreal, Forum on the Socially Responsible Development of AI

3 PROTECTION OF PRIVACY AND INTIMACY PRINCIPLE

... 3 PROTECTION OF privacy AND INTIMACY PRINCIPLE...

Published by University of Montreal

3 PROTECTION OF PRIVACY AND INTIMACY PRINCIPLE

...privacy and intimacy must be protected from AIS intrusion and data acquisition and archiving systems (DAAS)....

Published by University of Montreal

3 PROTECTION OF PRIVACY AND INTIMACY PRINCIPLE

...6) Every person must be able to exercise extensive control over their personal data, especially when it comes to its collection, use, and dissemination....

Published by University of Montreal

3 PROTECTION OF PRIVACY AND INTIMACY PRINCIPLE

...Access to AIS and digital services by individuals must not be made conditional on their abandoning control or ownership of their personal data....

Published by University of Montreal

3 PROTECTION OF PRIVACY AND INTIMACY PRINCIPLE

...7) Individuals should be free to donate their personal data to research organizations in order to contribute to the advancement of knowledge....

Published by University of Montreal

8 PRUDENCE PRINCIPLE

...4) The development of AIS must preempt the risks of user data misuse and protect the integrity and confidentiality of personal data....

Published by University of Montreal

4. Respect for Privacy

...Respect for privacy...

Published by National Governance Committee for the New Generation Artificial Intelligence, China

4. Respect for Privacy

...AI development should respect and protect the privacy of individuals and fully protect an individual’s rights to know and to choose....

Published by National Governance Committee for the New Generation Artificial Intelligence, China

4. Respect for Privacy

...Boundaries and rules should be established for the collection, storage, processing and use of personal information....

Published by National Governance Committee for the New Generation Artificial Intelligence, China

4. Respect for Privacy

...Personal privacy authorization and revocation mechanisms should be established and updated....

Published by National Governance Committee for the New Generation Artificial Intelligence, China

4. Respect for Privacy

...Stealing, juggling, leaking and other forms of illegal collection and use of personal information should be strictly prohibited....

Published by National Governance Committee for the New Generation Artificial Intelligence, China

Chapter 1. General Principles

...This set of norms aims to integrate ethics into the entire life cycle of AI, to promote fairness, justice, harmony, safety and security, and to avoid issues such as prejudice, discrimination, privacy and information leakage....

Published by National Governance Committee for the New Generation Artificial Intelligence, China

Chapter 1. General Principles

...(3) Protecting privacy and security....

Published by National Governance Committee for the New Generation Artificial Intelligence, China

Chapter 1. General Principles

...Fully respect the rights of personal information, to know, and to consent, etc., handle personal information, protect personal privacy and data security in accordance with the principles of lawfulness, justifiability, necessity, and integrity, do no harm to the legitimate rights of personal data, must not illegally collect and use personal information by stealing, tampering, or leaking, etc., and must not infringe on the rights of personal privacy....

Published by National Governance Committee for the New Generation Artificial Intelligence, China

Chapter 1. General Principles

...Fully respect the rights of personal information, to know, and to consent, etc., handle personal information, protect personal privacy and data security in accordance with the principles of lawfulness, justifiability, necessity, and integrity, do no harm to the legitimate rights of personal data, must not illegally collect and use personal information by stealing, tampering, or leaking, etc., and must not infringe on the rights of personal privacy....

Published by National Governance Committee for the New Generation Artificial Intelligence, China

Chapter 1. General Principles

...Fully respect the rights of personal information, to know, and to consent, etc., handle personal information, protect personal privacy and data security in accordance with the principles of lawfulness, justifiability, necessity, and integrity, do no harm to the legitimate rights of personal data, must not illegally collect and use personal information by stealing, tampering, or leaking, etc., and must not infringe on the rights of personal privacy....

Published by National Governance Committee for the New Generation Artificial Intelligence, China

Chapter 1. General Principles

...Fully respect the rights of personal information, to know, and to consent, etc., handle personal information, protect personal privacy and data security in accordance with the principles of lawfulness, justifiability, necessity, and integrity, do no harm to the legitimate rights of personal data, must not illegally collect and use personal information by stealing, tampering, or leaking, etc., and must not infringe on the rights of personal privacy....

Published by National Governance Committee for the New Generation Artificial Intelligence, China

Chapter 2. The Norms of Management

...Fully respect and protect the privacy, freedom, dignity, safety and other rights of relevant stakeholders and other legal rights and interests, and prohibit improper use of power to infringe the legal rights of natural persons, legal persons and other organizations....

Published by National Governance Committee for the New Generation Artificial Intelligence, China

Chapter 4. The Norms of Supply

...Strengthen the quality monitoring and the evaluations on the use of AI products and services, avoid infringements on personal safety, property safety, user privacy, etc....

Published by National Governance Committee for the New Generation Artificial Intelligence, China

Privacy and security

... privacy and security...

Published by Government of New South Welsh, Australia

Privacy and security

...NSW citizens must have confidence that data used for AI projects is used safely and securely, and in a way that is consistent with privacy, data sharing and information access requirements....

Published by Government of New South Welsh, Australia

Privacy and security

...Any project outcome will be undermined by lack of public trust if there is any risk of a data breach or that personal data could be compromised....

Published by Government of New South Welsh, Australia

Privacy and security

...incorporation of privacy by design principles...

Published by Government of New South Welsh, Australia

Privacy and security

...how information privacy, including potential for reidentification, and cyber security risks have been addressed...

Published by Government of New South Welsh, Australia

Privacy

... privacy...

Published by New Work Summit, hosted by The New York Times

· 4. A.I. must be designed for intelligent privacy — sophisticated protections that secure personal and group information in ways that earn trust.

...must be designed for intelligent privacy — sophisticated protections that secure personal and group information in ways that earn trust....

Published by Satya Nadella, CEO of Microsoft

· 1.2. Human centred values and fairness

...These include freedom, dignity and autonomy, privacy and data protection, non discrimination and equality, diversity, fairness, social justice, and internationally recognised labour rights....

Published by The Organisation for Economic Co-operation and Development (OECD)

· 1.2. Human centred values and fairness

...These include freedom, dignity and autonomy, privacy and data protection, non discrimination and equality, diversity, fairness, social justice, and internationally recognised labour rights....

Published by The Organisation for Economic Co-operation and Development (OECD)

· 1.4. Robustness, security and safety

...c) AI actors should, based on their roles, the context, and their ability to act, apply a systematic risk management approach to each phase of the AI system lifecycle on a continuous basis to address risks related to AI systems, including privacy, digital security, safety and bias....

Published by The Organisation for Economic Co-operation and Development (OECD)

· 2.1. Investing in AI research and development

...b) Governments should also consider public investment and encourage private investment in open datasets that are representative and respect privacy and data protection to support an environment for AI research and development that is free of inappropriate bias and to improve interoperability and use of standards....

Published by The Organisation for Economic Co-operation and Development (OECD)

· 2.1. Investing in AI research and development

...b) Governments should also consider public investment and encourage private investment in open datasets that are representative and respect privacy and data protection to support an environment for AI research and development that is free of inappropriate bias and to improve interoperability and use of standards....

Published by The Organisation for Economic Co-operation and Development (OECD)

5. Privacy protection

...privacy protection...

Published by OP Financial Group

5. Privacy protection

...We will guarantee privacy and personal data protection for the individuals represented in the data we use in accordance with our data protection principles....

Published by OP Financial Group

5. Privacy protection

...We will guarantee privacy and personal data protection for the individuals represented in the data we use in accordance with our data protection principles....

Published by OP Financial Group

5. Privacy protection

...We will guarantee privacy and personal data protection for the individuals represented in the data we use in accordance with our data protection principles....

Published by OP Financial Group

2. Good and fair

...These include dignity, autonomy, privacy, data protection, non discrimination, equality, and fairness....

Published by Government of Ontario, Canada

2. Good and fair

...These include dignity, autonomy, privacy, data protection, non discrimination, equality, and fairness....

Published by Government of Ontario, Canada

· a. Working to protect the privacy and security of individuals.

...Working to protect the privacy and security of individuals....

Published by Partnership on AI

f)Privacy of artificial intelligence:

... f)privacy of artificial intelligence:...

Published by THE PRESIDENT OF THE REPUBLIC and THE CONGRESS OF THE REPUBLIC

Encode privacy into technology

... Encode privacy into technology...

Published by Rebelliondefense

Encode privacy into technology

...We encode privacy protections and adhere to the principle of least privilege in our products, so that users only have access to data that they absolutely need to complete their specific task....

Published by Rebelliondefense

Encode privacy into technology

...Compliance with the applicable legal frameworks governing privacy is a basic tenet that guides our product development....

Published by Rebelliondefense

6. Security and privacy:

...Security and privacy:...

Published by The Pontifical Academy for Life, Microsoft, IBM, FAO, the Italia Government

6. Security and privacy:

...AI systems must work securely and respect the privacy of users....

Published by The Pontifical Academy for Life, Microsoft, IBM, FAO, the Italia Government

· 2. NEED FOR CONSCIOUS RESPONSIBILITY WHEN CREATING AND USING AI

...These include privacy; the ethical, safe and responsible use of personal data; the nature, degree and amount of damage that may follow as a result of the use of the technology and AIS; and the selection and use of companion hardware and software....

Published by AI Alliance Russia

· 2. NEED FOR CONSCIOUS RESPONSIBILITY WHEN CREATING AND USING AI

...These include privacy; the ethical, safe and responsible use of personal data; the nature, degree and amount of damage that may follow as a result of the use of the technology and AIS; and the selection and use of companion hardware and software....

Published by AI Alliance Russia

· 2. NEED FOR CONSCIOUS RESPONSIBILITY WHEN CREATING AND USING AI

...AI Actors must comply with the legislation of the Russian Federation in the field of personal data and secrets protected by law when using an AIS....

Published by AI Alliance Russia

· 2. NEED FOR CONSCIOUS RESPONSIBILITY WHEN CREATING AND USING AI

...Furthermore, they must ensure the protection and protection of personal data processed by an AIS or AI Actors in order to develop and improve the AIS by developing and implementing innovative methods of controlling unauthorized access by third parties to personal data and using high quality and representative datasets from reliable sources and obtained without breaking the law....

Published by AI Alliance Russia

· 2. RESPONSIBILITY MUST BE FULLY ACKNOWLEDGED WHEN CREATING AND USING AI

...on privacy, ethical, safe and responsible use of personal data;...

Published by AI Alliance Russia

· 2. RESPONSIBILITY MUST BE FULLY ACKNOWLEDGED WHEN CREATING AND USING AI

...on privacy, ethical, safe and responsible use of personal data;...

Published by AI Alliance Russia

· 2. RESPONSIBILITY MUST BE FULLY ACKNOWLEDGED WHEN CREATING AND USING AI

...AI Actors must comply with the national legislation in the field of personal data and secrets protected by law when using AI systems; ensure the security and protection of personal data processed by AI systems or by AI Actors in order to develop and improve the AI systems; develop and integrate innovative methods to counter unauthorized access to personal data by third parties and use high quality and representative datasets obtained without breaking the law from reliable sources....

Published by AI Alliance Russia

6. We place data protection and privacy at our core

...We place data protection and privacy at our core...

Published by SAP

6. We place data protection and privacy at our core

...We place data protection and privacy at our core...

Published by SAP

6. We place data protection and privacy at our core

...data protection and privacy are a corporate requirement and at the core of every product and service....

Published by SAP

6. We place data protection and privacy at our core

...Data protection and privacy are a corporate requirement and at the core of every product and service....

Published by SAP

6. We place data protection and privacy at our core

...This commitment to data protection and privacy is reflected in our commitment to all applicable regulatory requirements as well as through the research we conduct in partnership with leading academic institutions to develop the next generation of privacy enhancing methodologies and technologies....

Published by SAP

6. We place data protection and privacy at our core

...This commitment to data protection and privacy is reflected in our commitment to all applicable regulatory requirements as well as through the research we conduct in partnership with leading academic institutions to develop the next generation of privacy enhancing methodologies and technologies....

Published by SAP

6. We place data protection and privacy at our core

...This commitment to data protection and privacy is reflected in our commitment to all applicable regulatory requirements as well as through the research we conduct in partnership with leading academic institutions to develop the next generation of privacy enhancing methodologies and technologies....

Published by SAP

4. Privacy Protection

...privacy Protection...

Published by Shanghai Advisory Committee of Experts on Artificial Intelligence Industry Security

4. Privacy Protection

...The development of artificial intelligence needs to ensure the user's data security, artificial intelligence development must not be at the expense of user privacy, need to strengthen data protection legislation, enrich the technical route of artificial intelligence, and constantly strengthen user privacy protection in artificial intelligence applications....

Published by Shanghai Advisory Committee of Experts on Artificial Intelligence Industry Security

4. Privacy Protection

...The development of artificial intelligence needs to ensure the user's data security, artificial intelligence development must not be at the expense of user privacy, need to strengthen data protection legislation, enrich the technical route of artificial intelligence, and constantly strengthen user privacy protection in artificial intelligence applications....

Published by Shanghai Advisory Committee of Experts on Artificial Intelligence Industry Security

4. Privacy Protection

...The development of artificial intelligence needs to ensure the user's data security, artificial intelligence development must not be at the expense of user privacy, need to strengthen data protection legislation, enrich the technical route of artificial intelligence, and constantly strengthen user privacy protection in artificial intelligence applications....

Published by Shanghai Advisory Committee of Experts on Artificial Intelligence Industry Security

2. Transparency

...The process of collecting or utilizing personal data will be transparent....

Published by Samsung

Principle 1 – Fairness

...In addition, the potential risks, overall benefits, and purpose of utilizing sensitive personal data should be well motivated and defined or articulated by the AI System Owner....

Published by SDAIA

· Plan and Design:

...In addition, the potential risks, overall benefits, and purpose of utilizing sensitivepersonal data should be well motivated and defined or articulated by the AI System Owner....

Published by SDAIA

· Plan and Design:

...4 Sensitive personal data attributes relating to persons or groups which are systematically or historically disadvantaged should be identified and defined at this stage....

Published by SDAIA

· Prepare Input Data:

...2 Sensitive personal data attributes which are defined in the plan and design phase should not be included in the model data not to feed the existing bias on them....

Published by SDAIA

· Prepare Input Data:

...In this case, the justification of the usage of the sensitive personal data attributes or their proxies should be provided....

Published by SDAIA

Principle 2 – Privacy & Security

... Principle 2 – privacy & Security...

Published by SDAIA

Principle 2 – Privacy & Security

...The privacy and security principle represents overarching values that require AI systems;...

Published by SDAIA

Principle 2 – Privacy & Security

...throughout the AI System Lifecycle; to be built in a safe way that respects the privacy of the data collected as well as upholds the highest levels of data security processes and procedures to keep the data confidential preventing data and system breaches which could lead to reputational, psychological, financial, professional, or other types of harm....

Published by SDAIA

Principle 2 – Privacy & Security

...AI systems should be designed with mechanisms and controls that provide the possibility to govern and monitor their outcomes and progress throughout their lifecycle to ensure continuous monitoring within the privacy and security principles and protocols set in place....

Published by SDAIA

Plan and Design:

...1 The planning and design of the AI system and its associated algorithm must be configured and modelled in a manner such that there is respect for the protection of the privacy of individuals, personal data is not misused and exploited, and the decision criteria of the automated technology is not based on personally identifying characteristics or information....

Published by SDAIA

Plan and Design:

...1 The planning and design of the AI system and its associated algorithm must be configured and modelled in a manner such that there is respect for the protection of the privacy of individuals, personal data is not misused and exploited, and the decision criteria of the automated technology is not based on personally identifying characteristics or information....

Published by SDAIA

Plan and Design:

...2 The use of personal information should be limited only to that which is necessary for the proper functioning of the system....

Published by SDAIA

Plan and Design:

...4 privacy and security legal frameworks and standards should be followed and customized for the particular use case or organization....

Published by SDAIA

Plan and Design:

...5 An important aspect of privacy and security is data architecture; consequently, data...

Published by SDAIA

Plan and Design:

...classification and profiling should be planned to define the levels of protection and usage of personal data....

Published by SDAIA

Plan and Design:

...6 Security mechanisms for de identification should be planned for the sensitive or personal data in the system....

Published by SDAIA

· Prepare Input Data:

...1 The exercise of data procurement, management, and organization should uphold the legal frameworks and standards of data privacy....

Published by SDAIA

· Prepare Input Data:

...Data privacy and security protect information from a wide range of threats....

Published by SDAIA

· Prepare Input Data:

...3 Designers and engineers of the AI system must exhibit the appropriate levels of integrity to safeguard the accuracy and completeness of information and processing methods to ensure that the privacy and security legal framework and standards are followed....

Published by SDAIA

· Prepare Input Data:

...Data classification should be conducted in a contextual manner that does not result in the inference of personal information....

Published by SDAIA

· Prepare Input Data:

...Furthermore, de identification mechanisms should be employed based on data classification as well as requirements relating to data protection laws....

Published by SDAIA

· Build and Validate:

...1 privacy and security by design should be implemented while building the AI system....

Published by SDAIA

· Build and Validate:

...Furthermore, appropriate measures should be in place to ensure that AI systems with automated decision making capabilities uphold the necessary data privacy and security standards....

Published by SDAIA

· Build and Validate:

...1 After the deployment of the AI system, when its outcomes are realized, there must be continuous monitoring to ensure that the AI system is privacy preserving, safe and secure....

Published by SDAIA

· Build and Validate:

...The privacy impact assessment and risk management assessment should be continuously revisited to ensure that societal and ethical considerations are regularly evaluated....

Published by SDAIA

· Build and Validate:

...2 AI System Owners should be accountable for the design and implementation of AI systems in such a way as to ensure that personal information is protected throughout the life cycle of the AI system....

Published by SDAIA

· Build and Validate:

...The components of the AI system should be updated based on continuous monitoring and privacy impact assessment....

Published by SDAIA

· Plan and Design:

...AI system owners must define the level of transparency for different stakeholders on the technology based on data privacy, sensitivity, and authorization of the stakeholders....

Published by SDAIA

· Plan and Design:

...This has a direct effect on the training and implementation of these systems since the criteria for the data’s organization, and structuring must be transparent and explainable in their acquisition and collection adhering to data privacy regulations and intellectual property standards and controls....

Published by SDAIA

· 1) Privacy:

...· 1) privacy:...

Published by Youth Work Committee of Shanghai Computer Society

· 1) Privacy:

...Stipulate relevant laws and regulations, verify user ownership, strengthen the awareness of privacy protection, develop algorithms and technologies of privacy protection, collect and use data in an open, transparent and lawful manner....

Published by Youth Work Committee of Shanghai Computer Society

· 1) Privacy:

...Stipulate relevant laws and regulations, verify user ownership, strengthen the awareness of privacy protection, develop algorithms and technologies of privacy protection, collect and use data in an open, transparent and lawful manner....

Published by Youth Work Committee of Shanghai Computer Society

· We will make AI systems transparent

...Within the limits of privacy and the preservation of intellectual property, those who deploy AI systems should be transparent about the data and algorithms they use...

Published by Smart Dubai

· AI systems will be safe, secure and controllable by humans

...The continued security and privacy of users should be considered when decommissioning AI systems...

Published by Smart Dubai

· We will respect people’s privacy

...· We will respect people’s privacy...

Published by Smart Dubai

· We will respect people’s privacy

...AI systems should respect privacy and use the minimum intrusion necessary...

Published by Smart Dubai

· We will respect people’s privacy

...AI systems should uphold high standards of data governance and security, protecting personal information...

Published by Smart Dubai

· We will respect people’s privacy

...Surveillance or other AI driven technologies should not be deployed to the extent of violating internationally and or UAE’s accepted standards of privacy and human dignity and people rights...

Published by Smart Dubai

4. Privacy Protection

...privacy Protection...

Published by Sony Group

4. Privacy Protection

...Sony, in compliance with laws and regulations as well as applicable internal rules and policies, seeks to enhance the security and protection of customers' personal data acquired via products and services utilizing AI, and build an environment where said personal data is processed in ways that respect the intention and trust of customers....

Published by Sony Group

· 2. privacy protection

...· 2. privacy protection...

Published by The Ministry of Science and ICT (MSIT) and the Korea Information Society Development Institute (KISDI)

· ② Protection of Privacy

...· ② Protection of privacy...

Published by The Ministry of Science and ICT (MSIT) and the Korea Information Society Development Institute (KISDI)

· ② Protection of Privacy

...The privacy of individuals should be protected throughout the entire process of AI development and utilization....

Published by The Ministry of Science and ICT (MSIT) and the Korea Information Society Development Institute (KISDI)

· ② Protection of Privacy

...Efforts should be made to minimize the misuse and abuse of personal information throughout the entire AI system lifecycle....

Published by The Ministry of Science and ICT (MSIT) and the Korea Information Society Development Institute (KISDI)

· ⑦ Data Management

...Data, such as personal information, should not be used for purposes other than its intended use....

Published by The Ministry of Science and ICT (MSIT) and the Korea Information Society Development Institute (KISDI)

4. Understanding the need to protect privacy and national security, AI systems should be deployed in the most transparent manner possible;

...Understanding the need to protect privacy and national security, AI systems should be deployed in the most transparent manner possible;...

Published by The Treasury Board Secretariat of Canada (TBS)

2. Transparent and explainable AI

...We will be explicit about the kind of personal and or non personal data the AI systems uses as well as about the purpose the data is used for....

Published by Telefónica

4. Privacy and security by design

...privacy and security by design...

Published by Telefónica

4. Privacy and security by design

...AI systems are fuelled by data, and Telefónica is committed to respecting people’s right to privacy and their personal data....

Published by Telefónica

4. Privacy and security by design

...AI systems are fuelled by data, and Telefónica is committed to respecting people’s right to privacy and their personal data....

Published by Telefónica

4. Privacy and security by design

...When processing personal data, according to Telefónica’s privacy policy, we will at all times comply with the principles of lawfulness, fairness and transparency, data minimisation, accuracy, storage limitation, integrity and confidentiality....

Published by Telefónica

4. Privacy and security by design

...When processing personal data, according to Telefónica’s privacy policy, we will at all times comply with the principles of lawfulness, fairness and transparency, data minimisation, accuracy, storage limitation, integrity and confidentiality....

Published by Telefónica

4. Privacy and security by design

...In order to ensure compliance with our privacy Policy we use a privacy by Design methodology....

Published by Telefónica

4. Privacy and security by design

...In order to ensure compliance with our privacy Policy we use a privacy by Design methodology....

Published by Telefónica

4. Privacy and security by design

...We apply, according to Telefónica’s privacy policy, in all of the processing cycle phases, the technical and organizational measures required to guarantee a level of security adequate to the risk to which the personal information may be exposed and, in any case, in accordance with the security measures established in the law in force in each of the countries and or regions in which we operate....

Published by Telefónica

4. Privacy and security by design

...We apply, according to Telefónica’s privacy policy, in all of the processing cycle phases, the technical and organizational measures required to guarantee a level of security adequate to the risk to which the personal information may be exposed and, in any case, in accordance with the security measures established in the law in force in each of the countries and or regions in which we operate....

Published by Telefónica

3. Rights respecting

...We seek to identify, prevent, mitigate and account for how we address our impacts on human rights and how we manage human rights risks and opportunities, such as privacy, children’s rights and anti discrimination....

Published by Telia Company AB

· Privacy protection

...· privacy protection...

Published by Tencent Research Institute

· Privacy protection

... Comply with privacy requirements, and safeguard against data abuse...

Published by Tencent Research Institute

· Privacy protection

... privacy by design (PBD)...

Published by Tencent Research Institute

· Public engagement and exercise of individuals' rights

... Respect individuals' rights, such as data privacy, expression and information freedom, non discrimination, etc....

Published by Tencent Research Institute

1. Right to Transparency.

...The elements of the Transparency Principle can be found in several modern privacy laws, including the US Privacy Act, the EU data protection Directive, the GDPR, and the Council of Europe Convention 108....

Published by The Public Voice coalition, established by Electronic Privacy Information Center (EPIC)

1. Right to Transparency.

...The elements of the Transparency Principle can be found in several modern privacy laws, including the US privacy Act, the EU Data Protection Directive, the GDPR, and the Council of Europe Convention 108....

Published by The Public Voice coalition, established by Electronic Privacy Information Center (EPIC)

1. Right to Transparency.

...The elements of the Transparency Principle can be found in several modern privacy laws, including the US privacy Act, the EU Data Protection Directive, the GDPR, and the Council of Europe Convention 108....

Published by The Public Voice coalition, established by Electronic Privacy Information Center (EPIC)

11. Prohibition on Unitary Scoring.

...In data protection law, universal identifiers that enable the profiling of individuals across are disfavored....

Published by The Public Voice coalition, established by Electronic Privacy Information Center (EPIC)

That Thomson Reuters will prioritize security and privacy in our use of data and throughout the design, development and deployment of our data and AI products and services.

... That Thomson Reuters will prioritize security and privacy in our use of data and throughout the design, development and deployment of our data and AI products and services....

Published by Thomson Reuters

Second, the principle of security.

...Personal privacy should be protected and data breach and abuse prevented....

Published by Center for International Strategy and Security, Tsinghua University (Tsinghua CISS)

Fourth principle: Bias and Harm Mitigation

...These may range from harms caused by a lack of suitable privacy for personal data, to unintended military harms due to system unpredictability....

Published by The Ministry of Defence (MOD), United Kingdom

Fourth principle: Bias and Harm Mitigation

...These may range from harms caused by a lack of suitable privacy for personal data, to unintended military harms due to system unpredictability....

Published by The Ministry of Defence (MOD), United Kingdom

Fifth principle: Reliability

...Given Defence’s unique operational context and the challenges of the information environment, this principle also requires AI enabled systems to be secure, and a robust approach to cybersecurity, data protection and privacy....

Published by The Ministry of Defence (MOD), United Kingdom

Fifth principle: Reliability

...Given Defence’s unique operational context and the challenges of the information environment, this principle also requires AI enabled systems to be secure, and a robust approach to cybersecurity, data protection and privacy....

Published by The Ministry of Defence (MOD), United Kingdom

Right to privacy, data protection and data governance

... Right to privacy, data protection and data governance...

Published by United Nations System Chief Executives Board for Coordination

Right to privacy, data protection and data governance

... Right to privacy, data protection and data governance...

Published by United Nations System Chief Executives Board for Coordination

Right to privacy, data protection and data governance

...privacy of individuals and their rights as data subjects must be respected, protected and promoted throughout the lifecycle of AI systems....

Published by United Nations System Chief Executives Board for Coordination

Right to privacy, data protection and data governance

...When considering the use of AI systems, adequate data protection frameworks and data governance mechanisms should be established or enhanced in line with the United Nations personal data Protection and Privacy Principles also to ensure the integrity of the data used....

Published by United Nations System Chief Executives Board for Coordination

Right to privacy, data protection and data governance

...When considering the use of AI systems, adequate data protection frameworks and data governance mechanisms should be established or enhanced in line with the United Nations Personal data protection and Privacy Principles also to ensure the integrity of the data used....

Published by United Nations System Chief Executives Board for Coordination

Right to privacy, data protection and data governance

...When considering the use of AI systems, adequate data protection frameworks and data governance mechanisms should be established or enhanced in line with the United Nations Personal Data Protection and privacy Principles also to ensure the integrity of the data used....

Published by United Nations System Chief Executives Board for Coordination

· Safety and security

...Safe and secure AI will be enabled by the development of sustainable, privacy protective data access frameworks that foster better training and validation of AI models utilizing quality data....

Published by The United Nations Educational, Scientific and Cultural Organization (UNESCO)

· Right to Privacy, and Data Protection

...· Right to Privacy, and data protection...

Published by The United Nations Educational, Scientific and Cultural Organization (UNESCO)

· Right to Privacy, and Data Protection

...· Right to privacy, and Data Protection...

Published by The United Nations Educational, Scientific and Cultural Organization (UNESCO)

· Right to Privacy, and Data Protection

...privacy, a right essential to the protection of human dignity, human autonomy and human agency, must be respected, protected and promoted throughout the life cycle of AI systems....

Published by The United Nations Educational, Scientific and Cultural Organization (UNESCO)

· Right to Privacy, and Data Protection

...Adequate data protection frameworks and governance mechanisms should be established in a multi stakeholder approach at the national or international level, protected by judicial systems, and ensured throughout the life cycle of AI systems....

Published by The United Nations Educational, Scientific and Cultural Organization (UNESCO)

· Right to Privacy, and Data Protection

...Data protection frameworks and any related mechanisms should take reference from international data protection principles and standards concerning the collection, use and disclosure of personal data and exercise of their rights by data subjects while ensuring a legitimate aim and a valid legal basis for the processing of personal data, including informed consent....

Published by The United Nations Educational, Scientific and Cultural Organization (UNESCO)

· Right to Privacy, and Data Protection

...data protection frameworks and any related mechanisms should take reference from international data protection principles and standards concerning the collection, use and disclosure of personal data and exercise of their rights by data subjects while ensuring a legitimate aim and a valid legal basis for the processing of personal data, including informed consent....

Published by The United Nations Educational, Scientific and Cultural Organization (UNESCO)

· Right to Privacy, and Data Protection

...Algorithmic systems require adequate privacy impact assessments, which also include societal and ethical considerations of their use and an innovative use of the privacy by design approach....

Published by The United Nations Educational, Scientific and Cultural Organization (UNESCO)

· Right to Privacy, and Data Protection

...Algorithmic systems require adequate privacy impact assessments, which also include societal and ethical considerations of their use and an innovative use of the privacy by design approach....

Published by The United Nations Educational, Scientific and Cultural Organization (UNESCO)

· Right to Privacy, and Data Protection

...AI actors need to ensure that they are accountable for the design and implementation of AI systems in such a way as to ensure that personal information is protected throughout the life cycle of the AI system....

Published by The United Nations Educational, Scientific and Cultural Organization (UNESCO)

· Transparency and explainability

...While efforts need to be made to increase transparency and explainability of AI systems, including those with extra territorial impact, throughout their life cycle to support democratic governance, the level of transparency and explainability should always be appropriate to the context and impact, as there may be a need to balance between transparency and explainability and other principles such as privacy, safety and security....

Published by The United Nations Educational, Scientific and Cultural Organization (UNESCO)

· Multi stakeholder and adaptive governance and collaboration

...That means that States, complying with international law, can regulate the data generated within or passing through their territories, and take measures towards effective regulation of data, including data protection, based on respect for the right to privacy in accordance with international law and other human rights norms and standards....

Published by The United Nations Educational, Scientific and Cultural Organization (UNESCO)

· Multi stakeholder and adaptive governance and collaboration

...That means that States, complying with international law, can regulate the data generated within or passing through their territories, and take measures towards effective regulation of data, including data protection, based on respect for the right to privacy in accordance with international law and other human rights norms and standards....

Published by The United Nations Educational, Scientific and Cultural Organization (UNESCO)

3. Make AI Serve People and Planet

...This includes codes of ethics for the development, application and use of AI so that throughout their entire operational process, AI systems remain compatible and increase the principles of human dignity, integrity, freedom, privacy and cultural and gender diversity, as well as with fundamental human rights....

Published by UNI Global Union

4. Adopt a Human In Command Approach

...This entails that AI systems should be designed and operated to comply with existing law, including privacy....

Published by UNI Global Union

4. Adopt a Human In Command Approach

...Workers should have the right to access, manage and control the data AI systems generate, given said systems’ power to analyse and utilize that data (See principle 1 in “Top 10 principles for workers’ data privacy and protection”)....

Published by UNI Global Union

9. Ban the Attribution of Responsibility to Robots

...Robots should be designed and operated as far as is practicable to comply with existing laws, fundamental rights and freedoms, including privacy....

Published by UNI Global Union

4. Protect children's data and privacy

...Protect children's data and privacy...

Published by United Nations Children's Fund (UNICEF) and the Ministry of

4. Protect children's data and privacy

...Adopt a privacy by design approach....

Published by United Nations Children's Fund (UNICEF) and the Ministry of

(d) The United States must foster public trust and confidence in AI technologies and protect civil liberties, privacy, and American values in their application in order to fully realize the potential of AI technologies for the American people.

... (d) The United States must foster public trust and confidence in AI technologies and protect civil liberties, privacy, and American values in their application in order to fully realize the potential of AI technologies for the American people....

Published by The White House, United States

Respect the Law and Act with Integrity.

...Our use of AI will fully comply with applicable legal authorities and with policies and procedures that protect privacy, civil rights, and civil liberties....

Published by Intelligence Community (IC), United States

1. Public Trust in AI

...At the same time, AI applications could pose risks to privacy, individual rights, autonomy, and civil liberties that must be carefully assessed and appropriately addressed....

Published by The White House Office of Science and Technology Policy (OSTP), United States

1. Public Trust in AI

...The appropriate regulatory or non regulatory response to privacy and other risks must necessarily depend on the nature of the risk presented and the appropriate mitigations....

Published by The White House Office of Science and Technology Policy (OSTP), United States

6. Flexibility

...Targeted agency conformity assessment schemes, to protect health and safety, privacy, and other values, will be essential to a successful, and flexible, performance based approach....

Published by The White House Office of Science and Technology Policy (OSTP), United States

10. Interagency Coordination

...Agencies should coordinate with each other to share experiences and to ensure consistency and predictability of AI related policies that advance American innovation and growth in AI, while appropriately protecting privacy, civil liberties, and American values and allowing for sector and application specific approaches when appropriate....

Published by The White House Office of Science and Technology Policy (OSTP), United States

1. Public Trust in AI

...At the same time, AI applications could pose risks to privacy, individual rights, autonomy, and civil liberties that must be carefully assessed and appropriately addressed....

Published by The White House Office of Science and Technology Policy (OSTP), United States

1. Public Trust in AI

...The appropriate regulatory or non regulatory response to privacy and other risks must necessarily depend on the nature of the risk presented and the appropriate mitigations....

Published by The White House Office of Science and Technology Policy (OSTP), United States

6. Flexibility

...Targeted agency conformity assessment schemes, to protect health and safety, privacy, and other values, will be essential to a successful, and flexible, performance based approach....

Published by The White House Office of Science and Technology Policy (OSTP), United States

10. Interagency Coordination

...Agencies should coordinate with each other to share experiences and to ensure consistency and predictability of AI related policies that advance American innovation and growth in AI, while appropriately protecting privacy, civil liberties, and American values and allowing for sector and application specific approaches when appropriate....

Published by The White House Office of Science and Technology Policy (OSTP), United States

Data Privacy:

... Data privacy:...

Published by OSTP

5. Data Provenance

...However, concerns over privacy, protecting trade secrets, or revelation of analytics that might allow malicious actors to game the system can justify restricting access to qualified and authorized individuals....

Published by ACM US Public Policy Council (USACM)

Preservation of Privacy and Security

... Preservation of privacy and Security...

Published by Vodafone Group

Preservation of Privacy and Security

...We endeavour to respect the privacy and protect the security of all individuals served by the AI we develop....

Published by Vodafone Group

1 Protect autonomy

...Respect for autonomy also entails the related duties to protect privacy and confidentiality and to ensure informed, valid consent by adopting appropriate legal frameworks for data protection....

Published by World Health Organization (WHO)

1 Protect autonomy

...Respect for autonomy also entails the related duties to protect privacy and confidentiality and to ensure informed, valid consent by adopting appropriate legal frameworks for data protection....

Published by World Health Organization (WHO)

1 Protect autonomy

...data protection laws are one means of safeguarding individual rights and place obligations on data controllers and data processors....

Published by World Health Organization (WHO)

1 Protect autonomy

...Such laws are necessary to protect privacy and the confidentiality of patient data and to establish patients’ control over their data....

Published by World Health Organization (WHO)

1 Protect autonomy

...Construed broadly, data protection laws should also make it easy for people to access their own health data and to move or share those data as they like....

Published by World Health Organization (WHO)

3 Ensure transparency, explainability and intelligibility

...data protection laws already create specific obligations of explainability for automated decision making....

Published by World Health Organization (WHO)