<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>GDPR Archives - Artificial Intelligence</title>
	<atom:link href="https://www.aiuniverse.xyz/tag/gdpr/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.aiuniverse.xyz/tag/gdpr/</link>
	<description>Exploring the universe of Intelligence</description>
	<lastBuildDate>Mon, 27 Jan 2025 05:59:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>What is BigID and Use Cases of BigID?</title>
		<link>https://www.aiuniverse.xyz/what-is-bigid-and-use-cases-of-bigid/</link>
					<comments>https://www.aiuniverse.xyz/what-is-bigid-and-use-cases-of-bigid/#respond</comments>
		
		<dc:creator><![CDATA[vijay]]></dc:creator>
		<pubDate>Mon, 27 Jan 2025 05:59:54 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[BigID]]></category>
		<category><![CDATA[DataDiscovery]]></category>
		<category><![CDATA[DataGovernance]]></category>
		<category><![CDATA[DataPrivacy]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[RiskAssessment]]></category>
		<guid isPermaLink="false">https://www.aiuniverse.xyz/?p=20800</guid>

					<description><![CDATA[<p>BigID is a leading data intelligence platform designed to help organizations discover, classify, and protect sensitive data across on-premises, cloud, and hybrid environments. Leveraging advanced AI and <a class="read-more-link" href="https://www.aiuniverse.xyz/what-is-bigid-and-use-cases-of-bigid/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/what-is-bigid-and-use-cases-of-bigid/">What is BigID and Use Cases of BigID?</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="566" src="https://www.aiuniverse.xyz/wp-content/uploads/2025/01/image-237-1024x566.png" alt="" class="wp-image-20801" srcset="https://www.aiuniverse.xyz/wp-content/uploads/2025/01/image-237-1024x566.png 1024w, https://www.aiuniverse.xyz/wp-content/uploads/2025/01/image-237-300x166.png 300w, https://www.aiuniverse.xyz/wp-content/uploads/2025/01/image-237-768x424.png 768w, https://www.aiuniverse.xyz/wp-content/uploads/2025/01/image-237.png 1272w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>BigID is a leading data intelligence platform designed to help organizations discover, classify, and protect sensitive data across on-premises, cloud, and hybrid environments. Leveraging advanced AI and machine learning, BigID enables businesses to improve data privacy, security, compliance, and governance. It provides automated data discovery, cataloging, and risk assessment to help organizations manage their data effectively while adhering to regulatory standards like GDPR, CCPA, and HIPAA.</p>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading"><strong>What is BigID?</strong></h2>



<p>BigID is a modern data intelligence platform that enables enterprises to gain deep visibility into their structured and unstructured data. It helps organizations understand where their sensitive data is stored, how it’s being used, and who has access to it. By providing automated data discovery and classification, BigID helps businesses comply with data protection regulations and secure their critical information assets.</p>



<h3 class="wp-block-heading"><strong>Key Characteristics of BigID:</strong></h3>



<ul class="wp-block-list">
<li><strong>AI-Driven Data Discovery</strong>: Automatically scans and identifies sensitive data across various data sources.</li>



<li><strong>Comprehensive Data Classification</strong>: Categorizes data based on type, sensitivity, and regulatory requirements.</li>



<li><strong>Data Privacy and Compliance Management</strong>: Ensures adherence to GDPR, CCPA, HIPAA, and other regulations.</li>



<li><strong>Integration with Security and Privacy Tools</strong>: Works with SIEMs, DLP solutions, and cloud security platforms.</li>



<li><strong>Cloud-Native and Scalable</strong>: Supports multi-cloud and hybrid environments.</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading"><strong>Top 10 Use Cases of BigID</strong></h2>



<ol class="wp-block-list">
<li><strong>Data Discovery and Classification</strong>
<ul class="wp-block-list">
<li>Automatically identifies, classifies, and catalogs sensitive data across all storage locations.</li>
</ul>
</li>



<li><strong>Regulatory Compliance (GDPR, CCPA, HIPAA, etc.)</strong>
<ul class="wp-block-list">
<li>Helps businesses meet global data privacy laws by enforcing compliance policies and generating audit reports.</li>
</ul>
</li>



<li><strong>Data Governance</strong>
<ul class="wp-block-list">
<li>Provides data lineage and ownership tracking to maintain proper governance and accountability.</li>
</ul>
</li>



<li><strong>Sensitive Data Protection</strong>
<ul class="wp-block-list">
<li>Identifies high-risk data and integrates with security tools to enforce protection policies.</li>
</ul>
</li>



<li><strong>Data Minimization and Retention Management</strong>
<ul class="wp-block-list">
<li>Helps organizations reduce data storage costs by managing data lifecycle policies.</li>
</ul>
</li>



<li><strong>Cloud Security and Data Access Controls</strong>
<ul class="wp-block-list">
<li>Secures sensitive data across AWS, Azure, Google Cloud, and SaaS applications.</li>
</ul>
</li>



<li><strong>Data Risk Assessment</strong>
<ul class="wp-block-list">
<li>Identifies potential data risks and provides actionable insights for remediation.</li>
</ul>
</li>



<li><strong>Third-Party Risk Management</strong>
<ul class="wp-block-list">
<li>Monitors and assesses the security of third-party data processors and vendors.</li>
</ul>
</li>



<li><strong>Data Subject Rights Automation (DSAR)</strong>
<ul class="wp-block-list">
<li>Automates response to data access, deletion, and correction requests from individuals under privacy laws.</li>
</ul>
</li>



<li><strong>Data Security and Incident Response</strong>
<ul class="wp-block-list">
<li>Helps organizations detect data breaches and respond to security incidents effectively.</li>
</ul>
</li>
</ol>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading"><strong>Features of BigID</strong></h2>



<ol class="wp-block-list">
<li><strong>Automated Data Discovery</strong> – Uses AI and machine learning to scan and identify sensitive data across all repositories.</li>



<li><strong>Data Classification and Tagging</strong> – Categorizes data based on sensitivity, type, and regulatory requirements.</li>



<li><strong>Privacy and Compliance Management</strong> – Ensures regulatory compliance with built-in frameworks for GDPR, CCPA, HIPAA, etc.</li>



<li><strong>Risk Analysis and Reporting</strong> – Identifies data security risks and provides detailed reports for analysis.</li>



<li><strong>Data Cataloging</strong> – Organizes and indexes data for easy search, retrieval, and governance.</li>



<li><strong>Data Subject Request (DSR) Automation</strong> – Streamlines responses to data access and deletion requests.</li>



<li><strong>Cloud and SaaS Integration</strong> – Works seamlessly with AWS, Azure, Google Cloud, and third-party SaaS applications.</li>



<li><strong>Data Security and Access Control</strong> – Monitors and enforces access policies to prevent unauthorized use.</li>



<li><strong>Integration with SIEM and DLP</strong> – Enhances security by connecting with existing data protection and monitoring tools.</li>



<li><strong>Data Retention and Minimization</strong> – Helps organizations clean up redundant, obsolete, and trivial (ROT) data.</li>
</ol>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="428" src="https://www.aiuniverse.xyz/wp-content/uploads/2025/01/image-238-1024x428.png" alt="" class="wp-image-20802" srcset="https://www.aiuniverse.xyz/wp-content/uploads/2025/01/image-238-1024x428.png 1024w, https://www.aiuniverse.xyz/wp-content/uploads/2025/01/image-238-300x126.png 300w, https://www.aiuniverse.xyz/wp-content/uploads/2025/01/image-238-768x321.png 768w, https://www.aiuniverse.xyz/wp-content/uploads/2025/01/image-238.png 1207w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h2 class="wp-block-heading"><strong>How BigID Works and Architecture</strong></h2>



<h3 class="wp-block-heading"><strong>1. Data Discovery and Scanning</strong></h3>



<ul class="wp-block-list">
<li>BigID scans and analyzes structured and unstructured data across databases, cloud storage, file systems, and applications.</li>



<li>It uses machine learning and pattern recognition to identify sensitive data.</li>
</ul>



<h3 class="wp-block-heading"><strong>2. Data Classification and Tagging</strong></h3>



<ul class="wp-block-list">
<li>Data is automatically classified based on content, metadata, and context.</li>



<li>Tags are assigned to sensitive information, helping organizations apply security policies.</li>
</ul>



<h3 class="wp-block-heading"><strong>3. Data Governance and Compliance Monitoring</strong></h3>



<ul class="wp-block-list">
<li>The platform continuously monitors data for compliance with privacy regulations.</li>



<li>Custom rules can be created to track compliance adherence and generate audit-ready reports.</li>
</ul>



<h3 class="wp-block-heading"><strong>4. Risk Analysis and Remediation</strong></h3>



<ul class="wp-block-list">
<li>BigID provides a risk assessment dashboard that highlights security vulnerabilities and compliance gaps.</li>



<li>Automated workflows help organizations mitigate risks through data protection measures.</li>
</ul>



<h3 class="wp-block-heading"><strong>5. Integration and Automation</strong></h3>



<ul class="wp-block-list">
<li>BigID integrates with existing security tools, SIEMs, and cloud security solutions to enhance data protection.</li>



<li>APIs and connectors allow seamless automation of data privacy workflows.</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading"><strong>How to Install BigID</strong></h2>



<p><strong>BigID</strong> is a comprehensive data discovery and privacy management platform that helps organizations find, classify, and manage sensitive data across their environment. Installing <strong>BigID</strong> typically involves deploying the <strong>BigID Platform</strong> components, such as the <strong>BigID Data Discovery</strong> service and the <strong>BigID Console</strong> for managing and monitoring your data.</p>



<p>While <strong>BigID</strong> is mainly configured and managed via a web interface, you can automate its installation and configuration using <strong>command-line tools</strong>, <strong>scripts</strong>, or <strong>cloud automation tools</strong> like <strong>Terraform</strong>.</p>



<p>Here is a guide on how to install and configure <strong>BigID</strong> programmatically.</p>



<h3 class="wp-block-heading">1. <strong>Prerequisites</strong></h3>



<p>Before starting the installation, ensure the following:</p>



<ul class="wp-block-list">
<li>A <strong>valid BigID license</strong>.</li>



<li><strong>Linux</strong> or <strong>Windows</strong> systems for installing BigID components.</li>



<li><strong>Docker</strong> installed (for containerized deployments).</li>



<li><strong>Sufficient disk space</strong> (usually 10 GB or more).</li>



<li><strong>BigID account</strong> for downloading installation files and API access.</li>
</ul>



<h3 class="wp-block-heading">2. <strong>Install BigID on Linux Using Docker</strong></h3>



<p>BigID is commonly deployed using <strong>Docker</strong> containers for flexibility and scalability. Here&#8217;s how to install <strong>BigID</strong> using <strong>Docker</strong>.</p>



<h4 class="wp-block-heading"><strong>Step 1: Install Docker</strong></h4>



<p>First, ensure that <strong>Docker</strong> is installed on your system. If you don&#8217;t have Docker installed, you can do so by following the instructions for your system:</p>



<pre class="wp-block-code"><code># For Ubuntu
sudo apt-get update
sudo apt-get install -y docker.io

# For RHEL/CentOS
sudo yum install -y docker
</code></pre>



<h4 class="wp-block-heading"><strong>Step 2: Download BigID Docker Image</strong></h4>



<p>BigID provides a <strong>Docker image</strong> that can be used for installation. Pull the Docker image from the <strong>BigID Docker registry</strong>:</p>



<pre class="wp-block-code"><code># Pull the BigID Docker image
docker pull bigid/bigid:latest
</code></pre>



<h4 class="wp-block-heading"><strong>Step 3: Run BigID Containers</strong></h4>



<p>Once the Docker image is pulled, you can run the <strong>BigID Platform</strong> components using the following command:</p>



<pre class="wp-block-code"><code># Start BigID Data Discovery and Console containers
docker run -d --name bigid_console -p 8080:8080 bigid/bigid:latest
</code></pre>



<p>This command starts the <strong>BigID Console</strong> on port 8080. You can access the console from a web browser at <code>http://&lt;your-server-ip&gt;:8080</code>.</p>



<p>You can also run other required containers, such as <strong>BigID Data Discovery</strong> or <strong>BigID Search</strong>, based on your needs. For example:</p>



<pre class="wp-block-code"><code>docker run -d --name bigid_data_discovery -p 8081:8081 bigid/bigid:latest
</code></pre>



<h4 class="wp-block-heading"><strong>Step 4: Verify the Installation</strong></h4>



<p>To verify that the containers are running, use the following command:</p>



<pre class="wp-block-code"><code>docker ps
</code></pre>



<p>This will show all running containers, including <strong>BigID Console</strong> and <strong>BigID Data Discovery</strong>.</p>



<h3 class="wp-block-heading">3. <strong>Install BigID on Windows Using Docker</strong></h3>



<p>For <strong>Windows</strong> systems, the installation process is similar, but you need to have <strong>Docker Desktop</strong> installed and running.</p>



<h4 class="wp-block-heading"><strong>Step 1: Install Docker Desktop</strong></h4>



<p>Download and install <strong>Docker Desktop for Windows</strong> from the <a href="https://www.docker.com/products/docker-desktop">Docker website</a>. After installation, ensure the Docker is running.</p>



<h4 class="wp-block-heading"><strong>Step 2: Pull the BigID Docker Image</strong></h4>



<p>Just like with Linux, pull the <strong>BigID Docker image</strong>:</p>



<pre class="wp-block-code"><code>docker pull bigid/bigid:latest
</code></pre>



<h4 class="wp-block-heading"><strong>Step 3: Run BigID Containers</strong></h4>



<p>Run the <strong>BigID Console</strong> and other components:</p>



<pre class="wp-block-code"><code>docker run -d --name bigid_console -p 8080:8080 bigid/bigid:latest
</code></pre>



<h4 class="wp-block-heading"><strong>Step 4: Verify the Installation</strong></h4>



<p>Ensure that the containers are running correctly by using:</p>



<pre class="wp-block-code"><code>docker ps
</code></pre>



<h3 class="wp-block-heading">4. <strong>Install BigID Using Kubernetes (Optional)</strong></h3>



<p>For <strong>cloud-native deployments</strong> or larger organizations, you may want to use <strong>Kubernetes</strong> to deploy <strong>BigID</strong>.</p>



<h4 class="wp-block-heading"><strong>Step 1: Create a Kubernetes Cluster</strong></h4>



<p>Set up a Kubernetes cluster using a cloud service (e.g., <strong>Google Kubernetes Engine (GKE)</strong>, <strong>Amazon EKS</strong>, or <strong>Azure AKS</strong>), or use a local tool like <strong>Minikube</strong> to simulate a Kubernetes cluster for testing purposes.</p>



<h4 class="wp-block-heading"><strong>Step 2: Deploy BigID Using Kubernetes</strong></h4>



<p>You can use a <strong>Helm chart</strong> or <strong>Kubernetes manifest files</strong> to deploy BigID on a Kubernetes cluster.</p>



<pre class="wp-block-code"><code># Example BigID deployment manifest (bigid-deployment.yaml)
apiVersion: apps/v1
kind: Deployment
metadata:
  name: bigid
spec:
  replicas: 1
  selector:
    matchLabels:
      app: bigid
  template:
    metadata:
      labels:
        app: bigid
    spec:
      containers:
      - name: bigid
        image: bigid/bigid:latest
        ports:
        - containerPort: 8080
</code></pre>



<h4 class="wp-block-heading"><strong>Step 3: Apply the Manifest to Deploy BigID</strong></h4>



<p>Run the following command to deploy <strong>BigID</strong> using <strong>Kubernetes</strong>:</p>



<pre class="wp-block-code"><code>kubectl apply -f bigid-deployment.yaml
</code></pre>



<p>This will deploy <strong>BigID</strong> on your Kubernetes cluster. You can expose the service using <strong>LoadBalancer</strong> or <strong>Ingress</strong> to make it accessible via a web browser.</p>



<h3 class="wp-block-heading">5. <strong>Automate BigID Configuration with APIs</strong></h3>



<p>After installation, <strong>BigID</strong> provides REST APIs to automate various tasks such as retrieving findings, managing policies, and running discovery jobs. Here&#8217;s an example of how you can interact with <strong>BigID APIs</strong> programmatically.</p>



<h4 class="wp-block-heading"><strong>Step 1: Obtain an API Token</strong></h4>



<p>To authenticate and interact with the <strong>BigID API</strong>, you will first need an API token. You can obtain the token by logging into the <strong>BigID Console</strong> and generating it in the API section.</p>



<h4 class="wp-block-heading"><strong>Step 2: Make API Requests</strong></h4>



<p>Here’s an example of how to interact with the <strong>BigID API</strong> using <strong>Python</strong> to get a list of findings:</p>



<pre class="wp-block-code"><code>import requests

# BigID API endpoint
api_url = "http://&lt;bigid-server-ip&gt;:8080/api/v1/findings"

# BigID API authentication
headers = {
    'Authorization': 'Bearer YOUR_API_TOKEN',
    'Content-Type': 'application/json'
}

# Fetch findings
response = requests.get(api_url, headers=headers)

if response.status_code == 200:
    findings = response.json()
    print("BigID Findings:", findings)
else:
    print(f"Failed to retrieve findings: {response.status_code}")
</code></pre>



<p>Replace <code>&lt;bigid-server-ip&gt;</code> with the IP address or hostname of your <strong>BigID Console</strong> and <code>YOUR_API_TOKEN</code> with your actual API token.</p>



<h3 class="wp-block-heading">6. <strong>Monitor and Maintain BigID</strong></h3>



<p>Once <strong>BigID</strong> is installed, you can:</p>



<ul class="wp-block-list">
<li>Monitor your data discovery processes through the <strong>BigID Console</strong>.</li>



<li>Create and manage policies and jobs for data classification.</li>



<li>Use <strong>REST APIs</strong> to interact with <strong>BigID</strong> programmatically.</li>



<li>Configure <strong>alerts</strong> and <strong>notifications</strong> for sensitive data findings.</li>
</ul>



<h3 class="wp-block-heading">7. <strong>Automate with Terraform (Optional)</strong></h3>



<p>You can use <strong>Terraform</strong> to automate the provisioning of infrastructure for <strong>BigID</strong> in cloud environments. Below is an example configuration to deploy <strong>BigID</strong> on <strong>AWS</strong> using Terraform.</p>



<pre class="wp-block-code"><code>provider "aws" {
  region = "us-east-1"
}

resource "aws_instance" "bigid_instance" {
  ami = "ami-0abcdef1234567890" # Example AMI ID for Ubuntu
  instance_type = "t2.medium"
  key_name = "my-key"
  tags = {
    Name = "BigID-Instance"
  }
}

resource "aws_security_group" "bigid_sg" {
  name        = "bigid_sg"
  description = "Allow inbound traffic for BigID"
  ingress {
    from_port   = 8080
    to_port     = 8080
    protocol    = "tcp"
    cidr_blocks = &#091;"0.0.0.0/0"]
  }
}
</code></pre>



<p>Run the following Terraform commands to deploy the infrastructure:</p>



<pre class="wp-block-code"><code>terraform init
terraform plan
terraform apply</code></pre>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading"><strong>Basic Tutorials of BigID: Getting Started</strong></h2>



<h3 class="wp-block-heading"><strong>Step 1: Log in to the BigID Dashboard</strong></h3>



<ul class="wp-block-list">
<li>Access the BigID console using your admin credentials.</li>
</ul>



<h3 class="wp-block-heading"><strong>Step 2: Add Data Sources</strong></h3>



<ol class="wp-block-list">
<li>Navigate to <strong>Data Sources</strong>.</li>



<li>Select a new data source (e.g., AWS S3, SQL Server, Google Drive).</li>



<li>Authenticate and configure access permissions.</li>
</ol>



<h3 class="wp-block-heading"><strong>Step 3: Start a Data Scan</strong></h3>



<ul class="wp-block-list">
<li>Click on <strong>Scan Now</strong> to start analyzing data across connected sources.</li>
</ul>



<h3 class="wp-block-heading"><strong>Step 4: Review Data Classification Results</strong></h3>



<ul class="wp-block-list">
<li>Go to <strong>Insights &gt; Data Classification</strong> to view categorized data.</li>
</ul>



<h3 class="wp-block-heading"><strong>Step 5: Set Up Compliance Rules</strong></h3>



<ul class="wp-block-list">
<li>Enable compliance frameworks like <strong>GDPR</strong> and <strong>CCPA</strong> under the <strong>Compliance Center</strong>.</li>
</ul>



<h3 class="wp-block-heading"><strong>Step 6: Automate Risk Remediation</strong></h3>



<ul class="wp-block-list">
<li>Configure automated risk response actions under <strong>Risk Management</strong>.</li>
</ul>
<p>The post <a href="https://www.aiuniverse.xyz/what-is-bigid-and-use-cases-of-bigid/">What is BigID and Use Cases of BigID?</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/what-is-bigid-and-use-cases-of-bigid/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Will the proposed EU AI rules become the GDPR for biometrics?</title>
		<link>https://www.aiuniverse.xyz/will-the-proposed-eu-ai-rules-become-the-gdpr-for-biometrics/</link>
					<comments>https://www.aiuniverse.xyz/will-the-proposed-eu-ai-rules-become-the-gdpr-for-biometrics/#respond</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Sat, 26 Jun 2021 09:32:15 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Biometrics]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[proposed]]></category>
		<category><![CDATA[rules]]></category>
		<guid isPermaLink="false">https://www.aiuniverse.xyz/?p=14573</guid>

					<description><![CDATA[<p>Source &#8211; https://www.biometricupdate.com/ After several high-profile cases, it’s understandable that governments would want to start regulating artificial intelligence (AI), and biometric technology in particular. The Clearview AI scandal has <a class="read-more-link" href="https://www.aiuniverse.xyz/will-the-proposed-eu-ai-rules-become-the-gdpr-for-biometrics/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/will-the-proposed-eu-ai-rules-become-the-gdpr-for-biometrics/">Will the proposed EU AI rules become the GDPR for biometrics?</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Source &#8211; https://www.biometricupdate.com/</p>



<p>After several high-profile cases, it’s understandable that governments would want to start regulating artificial intelligence (AI), and biometric technology in particular. The Clearview AI scandal has shown that people are really ‘not OK’ with the knowledge that companies scraped the internet for private images in order to train a facial recognition AI solution they then turned around and sold to law enforcement agencies.</p>



<p>Additionally, a number of cases by civil rights groups have shown that when AI is employed to make decisions about providing credit, rendering a verdict, or simply verifying the identity of a person, minorities are often discriminated against.</p>



<p>At the end of April, the EU adopted a proposal for a regulation called the Artificial Intelligence Act (AIA) designed to regulate AI-based solutions. When these new rules go fully into effect, the EU hopes to become a global trendsetter in AI regulation. The framework of these new laws are similar to the General Data Privacy Regulation (GDPR), which went live in 2018: The legal machinations trigger whenever personal data of an EU citizen is processed anywhere in the world.</p>



<h2 class="wp-block-heading">New legislation on the horizon</h2>



<p>The good news for AI and biometrics companies is that GDPR took two years to move from the proposal stage to the regulation finally adopted by the bloc, so the business world had time to prepare. In its current form, the AIA looks similar to GDPR in what it seeks to accomplish: a means to give end-users a way to control the collection and use of their personal data and digital likeness. In a word: transparency.</p>



<p>AIA argues that the end-user should know, at all times, that they are being judged by AI-powered technology. Is that a chatbot or a live person helping them online? Is their likeness being collected for biometric identification?</p>



<p>Companies that already offer settings to disallow collection of biometric data, or can integrate well with personal data management systems, will find they have the advantage under this emergent new regulatory scrutiny. For biometrics companies in general, the adherence to the final version of these new rules will be required for the correct collection, filtering, and labeling of datasets.</p>



<h2 class="wp-block-heading">A spate of independent U.S. regulations adds to the complexity</h2>



<p>The fragmented nature of the U.S. rules governing the collecting of biometric data has already cost Facebook upward of half a billion dollars, with similar lawsuits against Google, Amazon and Microsoft underway. The absence of clear rules at a federal level leaves it up to the states to decide what AI companies are allowed to collect in terms of personal information without their user’s consent. However, California’s CCPA, Illinois’ PIPA, Massachusetts Data Privacy Act, New York Privacy Act, and the Hawaii Consumer Privacy Protection Act all have the same aim.</p>



<p>For instance, New York’s strict privacy statute has a private right of action for any violation of the law, applicable to all businesses. This means virtually anyone who feels they deserve to pursue legal recourse against a New York business they feel might have violated their rights as described under the state’s privacy statute can do so by simply going down to the civil courthouse, and filing a lawsuit.</p>



<h2 class="wp-block-heading">Regulation yields… growth?</h2>



<p>From an industry standpoint, a common set of regulations governing the use of AI would be a great way to reduce friction when introducing biometrics-based solutions to different markets across large markets like the EU constituent countries and fifty U.S. states. Under one framework, companies can focus on creating solutions that offer the maximum amount of privacy and transparency while solving the kinds of problems that AI exists to solve in the first place.</p>



<p>What we can expect to see in the near future is a flourishing of companies that will provide third party certifications of compliance with the new regulation—from dataset audit to algorithm bias measurements. Some of these services are already standardized via the U.S.-based National Institute of Standards and Technologies (NIST) that, for instance, compares accuracy and speed of facial recognition and fingerprint algorithms, among others. NIST even conducted an extremely thorough comparison of all submitted algorithms regarding their bias against minority groups or ability to recognize faces when wearing protective masks.</p>



<p>Universal regulation also singles out large-scale, facial-recognition-driven surveillance of open spaces as an especially high-risk application of the technology. Due to its “big brother” nature, it is understandable that such an application will be a domain of only a handful of companies, with the rest shying away from such controversy.</p>



<p>There is a growing number of benign applications of biometrics that improve the life of the users without opening their personal data to possible misuse, and that is where the future lies. The COVID-19 pandemic has shown that biometric applications allowed certain industries like financial services and telcos to continue doing business that used to be conducted in-person to confirm proof of identity (opening a bank account, for example) even during the lockdowns. In fact, the technology has proven to be so convenient that even branches adopted digital onboarding instead of their former paper processes. This is where the strength of the technology lies, solving problems in a way that facilitates and maximizes convenience.</p>



<h2 class="wp-block-heading">Final thoughts</h2>



<p>AI is only as intelligent as the data we feed it. If you show a machine learning algorithm 100,000 pictures of a fish, it eventually can draw conclusions about the fish, but a toddler can see one or two pictures of a fish and determine whether or not the following picture is a fish or something else.</p>



<p>However, researchers aren’t always entirely sure as to how AI comes to the decisions that it makes, other than if you feed it biased information, you get biased results. This is why facial recognition has problems with correctly identifying people with darker skin. Datasets of photos used to train facial recognition algorithms contain more images of people with lighter skin than darker skinned people. Resultantly, there’s been an industry push towards explainable AI. ‘XAI’ so you can see what decisions the machine went through to come to its verdict.</p>



<p>At Innovatrics, we found that our AI algorithm is able to identify faces behind face masks, even though it has not been taught to do so. It’s virtually incomprehensible how AI arrives at its decisions because up until now, transparency or explainability haven’t been major outcomes AI engineers have considered when looking for results.</p>



<p>Looking towards the future, as new regulations governing the technology come into effect, explainability and comprehensibility will become the standard. Companies who value transparency and their customer’s privacy will come out ahead in this new era of machine learning.</p>
<p>The post <a href="https://www.aiuniverse.xyz/will-the-proposed-eu-ai-rules-become-the-gdpr-for-biometrics/">Will the proposed EU AI rules become the GDPR for biometrics?</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/will-the-proposed-eu-ai-rules-become-the-gdpr-for-biometrics/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Google ordered to halt human review of voice AI recordings over privacy risks</title>
		<link>https://www.aiuniverse.xyz/google-ordered-to-halt-human-review-of-voice-ai-recordings-over-privacy-risks/</link>
					<comments>https://www.aiuniverse.xyz/google-ordered-to-halt-human-review-of-voice-ai-recordings-over-privacy-risks/#respond</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Sat, 03 Aug 2019 10:12:17 +0000</pubDate>
				<category><![CDATA[Google AI]]></category>
		<category><![CDATA[data-protection law]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Google Assistant service]]></category>
		<category><![CDATA[human review]]></category>
		<category><![CDATA[voice AI]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=4249</guid>

					<description><![CDATA[<p>Source: techcrunch.com A German privacy watchdog has ordered Google  to cease manual reviews of audio snippets generated by its voice AI.  This follows a leak last month of scores of audio <a class="read-more-link" href="https://www.aiuniverse.xyz/google-ordered-to-halt-human-review-of-voice-ai-recordings-over-privacy-risks/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/google-ordered-to-halt-human-review-of-voice-ai-recordings-over-privacy-risks/">Google ordered to halt human review of voice AI recordings over privacy risks</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Source: techcrunch.com</p>



<p>A German privacy watchdog has ordered Google  to cease manual reviews of audio snippets generated by its voice AI. </p>



<p>This follows a leak last month of scores of audio snippets from the Google Assistant service. A contractor working as a Dutch language reviewer handed more than 1,000 recordings to the Belgian news site VRT which was then able to identify some of the people in the clips. It reported being able to hear people’s addresses, discussion of medical conditions, and recordings of a woman in distress.</p>



<p>The Hamburg data protection authority told Google of its intention to use Article 66 powers of the General Data Protection Regulation (GDPR) to begin an “urgency procedure” under Article 66 of GDPR last month.</p>



<p>Article 66&nbsp;allows a DPA to order data processing to stop if it believes there is “an urgent need to act in order to protect the rights and freedoms of data subjects”.</p>



<p>This appears to be the first use of the power since GDPR came into force across the bloc in May last year.</p>



<p>Google says it responded to the DPA on July 26 to say it had already ceased the practice — taking the decision to manually suspend audio reviews of Google Assistant across the whole of Europe, and doing so on July 10, after learning of the data leak.</p>



<p>Last month it also informed its lead privacy regulator in Europe, the Irish Data Protection Commission (DPC), of the breach — which also told us it is now “examining” the issue that’s been highlighted by Hamburg’s order.</p>



<p>The Irish DPC’s head of communications, Graham Doyle, said Google Ireland filed an Article 33 breach notification for the Google Assistant data “a couple of weeks ago”, adding: “We note that as of 10 July Google Ireland ceased the processing in question and that they have committed to the continued suspension of processing for a period of at least three months starting today (1 August). In the meantime we are currently examining the matter.”</p>



<p>It’s not clear whether Google will be able to reinstate manual reviews in Europe in a way that’s compliant with the bloc’s privacy rules. The Hamburg DPA writes in a statement [in German] on its website that it has “significant doubts” about whether Google Assistant complies with EU data-protection law.</p>



<p>“We are in touch with the Hamburg data protection authority and are assessing how we conduct audio reviews and help our users understand how data is used,” Google’s spokesperson also told us.</p>



<p>In a blog post published last month after the leak, Google product manager for search, David Monsees, claimed manual reviews of Google Assistant queries are “a critical part of the process of building speech technology”, couching them as “necessary” to creating such products.</p>



<p>“These reviews help make voice recognition systems more inclusive of different accents and dialects across languages. We don’t associate audio clips with user accounts during the review process, and only perform reviews for around 0.2% of all clips,” Google’s spokesperson added now.</p>



<p>But it’s far from clear whether human review of audio recordings captured by any of the myriad always-on voice AI products and services now on the market will be able to be compatible with European’s fundamental privacy rights.</p>



<p>These AIs typically have trigger words for activating the recording function which streams audio data to the cloud. But the technology can easily be accidentally triggered — and leaks have shown they are able to hoover up sensitive and intimate personal data not just of their owner but anyone in their vicinity (which of course includes people who never got within sniffing distance of any T&amp;Cs).</p>



<p>In its website the Hamburg DPA says the intended proceedings against Google are intended to protect the privacy rights of affected users in the immediate term, noting that GDPR allows for concerned authorities in EU Member States to issue orders of up to three months.</p>



<p>In a statement Johannes Caspar, the Hamburg commissioner for data protection, added: “The use of language assistance systems in the EU must comply with the data protection requirements of the GDPR. In the case of the Google Assistant, there are currently significant doubts. The use of language assistance systems must be done in a transparent way, so that an informed consent of the users is possible. In particular, this involves providing sufficient information and transparently informing those concerned about the processing of voice commands, but also about the frequency and risks of mal-activation. Finally, due regard must be given to the need to protect third parties affected by the recordings. First of all, further questions about the functioning of the speech analysis system have to be clarified. The data protection authorities will then have to decide on definitive measures that are necessary for a privacy-compliant operation. ”</p>



<p>The DPA also urges other regional privacy watchdogs to prioritize checks on other providers of language assistance systems — and “implement appropriate measures” — name-checking rival providers of voice AIs, Apple  and Amazon .</p>



<p>This suggests there could be wider ramifications for other tech giants operating voice AIs in Europe flowing from this single notification of an Article 66 order.</p>



<p>The real enforcement punch packed by GDPR is not the headline-grabbing fines, which can scale as high as 4% of a company’s global annual turnover — it’s the power that Europe’s DPAs now have in their regulatory toolbox to order that data stops flowing.</p>



<p>“This is just the beginning,” one expert on European data protection legislation told us, speaking on condition of anonymity. “The Article 66 chest is open and it has a lot on offer.”</p>



<p>In a sign of the potential scale of the looming privacy problems for voice AIs, Apple also said earlier today that it’s suspending a similar human review ‘quality control program’ for its Siri voice assistant.</p>



<p>The move, which does not appear to be linked to any regulatory order, follows a Guardian report last week detailing claims by a whistleblower that contractors working for Apple ‘regularly hear confidential details’ on Siri recordings, such as audio of people having sex and identifiable financial details, regardless of the processes Apple uses to anonymize the records.</p>



<p>Apple’s suspension of manual reviews of Siri snippets applies worldwide.</p>
<p>The post <a href="https://www.aiuniverse.xyz/google-ordered-to-halt-human-review-of-voice-ai-recordings-over-privacy-risks/">Google ordered to halt human review of voice AI recordings over privacy risks</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/google-ordered-to-halt-human-review-of-voice-ai-recordings-over-privacy-risks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
