Data protection & AI: How can we control our creations?
🤖 Adam Corey, VP of Marketing at Tealium
, discusses the opportunities for machine learning
and how the benefits are only possible if “data and processes are in optimal shape”
and are compliant with privacy laws:
After all, machine learning will only ever be as good as the data and programming powering the technology.
Last week, the government announced new laws to grant people more control
over how others use their personal data
. 🛡 Alongside matching many GDPR measures, the new Data Protection Bill will include two new criminal offences
(with unlimited fines 💰):
Re-identifying people from anonymous data: Data is often kept anonymous to respect people’s privacy, but by piecing many of these bits together, it might be possible to identify an individual’s browsing habits or credit card transactions.
Changing data: Organisations could also face criminal charges if they are found tampering with data that has been requested by an individual.
I worry that if re-identification is simply banned, there might be no incentive for sane security and privacy engineering designs. It’s a paradox, but re-identification ban might end up leading into overall weaker systems.
Information Commissioner, Elizabeth Denham, published part two of her General Data Protection Regulation (GDPR) myth-busting series
(part one here
). ⚔ This week, Denham addresses how consent is not the ‘silver bullet’ for GDPR compliance
. Denham emphasises the importance of companies starting to prepare now
, rather than “waiting for us to publish our final guidance on consent”. 📚
The centralised architecture has dominated internet services for the past decades. Under this model, you have to entrust our digital information to brokers such as Facebook and Google. These companies store our data, guarantee its security and integrity, and leverage it to improve their services.
But they also use it for other business purposes, often without your consent and giving you little choice. If the broker decides to close down your account, or if their servers fail, all your data goes with it.
KEY TAKEAWAY - the technologies that support the “creation, storage and distribution” of digital information need to “reflect that value and safeguard the rights and interest of its true owners”. ✅