<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-1955794330678593771</id><updated>2026-01-24T23:47:13.857+00:00</updated><category term="eu"/><category term="data protection"/><category term="uk"/><category term="privacy"/><category term="cloud computing"/><category term="GDPR"/><category term="cloud"/><category term="AI"/><category term="cookies"/><category term="law"/><category term="security"/><category term="artificial intelligence"/><category term="cybersecurity"/><category term="law reform"/><category term="Google"/><category term="international data transfers"/><category term="Europe"/><category term="LLMs"/><category term="data protection directive"/><category term="ico"/><category term="machine learning"/><category term="usability"/><category term="CRA"/><category term="EDPB"/><category term="EEA"/><category term="General Data Protection Regulation"/><category term="ML"/><category term="adtech"/><category term="international transfers"/><category term="parody"/><category term="product liability"/><category term="training"/><category term="transfers"/><category term="AI Act"/><category term="AI Liability Directive"/><category term="AI liability"/><category term="AI uses"/><category term="Article 31 Committee"/><category term="Council of Europe"/><category term="EU AI Act"/><category term="EU comitology"/><category term="Glass"/><category term="IoT"/><category term="NIS Regulations"/><category term="Privacy Shield"/><category term="SBOM"/><category term="UN Digital Compact"/><category term="US"/><category term="accessibility"/><category term="bias"/><category term="children"/><category term="compensation"/><category term="consent"/><category term="covid19"/><category term="cyber security"/><category term="discrimination"/><category term="draft general data protection regulation"/><category term="drcf"/><category term="encryption"/><category term="equality"/><category term="fairness"/><category term="fix"/><category term="g-cloud"/><category term="gcloud"/><category term="government"/><category term="humour"/><category term="infographics"/><category term="large language models"/><category term="liability"/><category term="model clauses"/><category term="open-source"/><category term="personal data"/><category term="photos"/><category term="ransomware"/><category term="software"/><category term="solution"/><category term="tool"/><category term="tutorial"/><category term="ADM"/><category term="AI Pact"/><category term="AI literacy"/><category term="AI principles"/><category term="AI risk assessment"/><category term="AI risks"/><category term="AI supply chain"/><category term="AI treaty"/><category term="AI value chain"/><category term="APA"/><category term="Article 93(2) Committee"/><category term="BCRs"/><category term="CJEU"/><category term="Canada"/><category term="Canon"/><category term="Chrome"/><category term="Commission adequacy decisions"/><category term="Commission implementing acts"/><category term="Commission proposals"/><category term="D&amp;TA"/><category term="DHSC"/><category term="DORA"/><category term="DPIA"/><category term="DSARs"/><category term="DSPs"/><category term="EFTA"/><category term="FTC"/><category term="G7"/><category term="HUDERIA"/><category term="Hadoop"/><category term="ISS"/><category term="IaaS"/><category term="Information Tribunal"/><category term="Lexology"/><category term="LinkedIn"/><category term="MF Toolbox"/><category term="MFToolbox"/><category term="MSPs"/><category term="NHS"/><category term="NIS"/><category term="NIS Directive"/><category term="NIS2"/><category term="NIS2 Directive"/><category term="PAIR"/><category term="PSNI"/><category term="PaaS"/><category term="R"/><category term="RDPS"/><category term="RDSPs"/><category term="RIO"/><category term="SaaS"/><category term="Safe Harbor"/><category term="SchremsII"/><category term="TTIP"/><category term="Twitter"/><category term="UK Data Protection Act 2018"/><category term="UK NIS Regulations"/><category term="USA"/><category term="United States"/><category term="Windows"/><category term="Windows11"/><category term="additional safeguards"/><category term="adequacy"/><category term="adequate protection"/><category term="age"/><category term="age assurance"/><category term="age checking"/><category term="age verification"/><category term="ageing"/><category term="algorithmic management"/><category term="anonymisation"/><category term="appropriate safeguards"/><category term="authentication"/><category term="automated decision-making"/><category term="availability"/><category term="biometrics"/><category term="business continuity"/><category term="carol"/><category term="certifications"/><category term="chatbots"/><category term="clauses"/><category term="cloud providers"/><category term="cloud services"/><category term="confidential computing"/><category term="consumer"/><category term="contracts"/><category term="controllers"/><category term="coronavirus"/><category term="covid-19"/><category term="critical infrastructure"/><category term="cyber"/><category term="dark patterns"/><category term="data centres"/><category term="data localization"/><category term="data minimisation"/><category term="data protection by design and by default"/><category term="data provenance"/><category term="database fields"/><category term="digital exclusion"/><category term="digital identity"/><category term="digital inclusion"/><category term="digital service providers"/><category term="digitalservicesact"/><category term="dsa"/><category term="employees"/><category term="enclaves"/><category term="ergonomics"/><category term="ethnicity"/><category term="facial recognition"/><category term="fines"/><category term="form fields"/><category term="fraud"/><category term="freedom of information"/><category term="generative AI"/><category term="governance"/><category term="hallucinations"/><category term="health"/><category term="healthcare"/><category term="highlighting"/><category term="human rights"/><category term="hype"/><category term="identity theft"/><category term="information society services"/><category term="introduction"/><category term="javascript"/><category term="laws"/><category term="learning"/><category term="legal sites"/><category term="legislation"/><category term="legitimate interests"/><category term="lockdown"/><category term="managed service providers"/><category term="managed services"/><category term="marketing"/><category term="metadata"/><category term="models"/><category term="music"/><category term="network &amp; information systems security"/><category term="networking"/><category term="non-material damage"/><category term="ofcom"/><category term="online courses"/><category term="operators of essential services"/><category term="outsourcing"/><category term="parental consent"/><category term="passkeys"/><category term="passwords"/><category term="pecr"/><category term="personal data export"/><category term="personalised pricing"/><category term="philosophy"/><category term="privacy by design"/><category term="privacybydesign"/><category term="processing"/><category term="processors"/><category term="programming"/><category term="proxy data"/><category term="pseudonymisation"/><category term="public sector"/><category term="purpose limitation"/><category term="quantum"/><category term="race"/><category term="racial"/><category term="ransomeware"/><category term="recommender systems"/><category term="recording"/><category term="relevant digital service providers"/><category term="research"/><category term="review"/><category term="risks"/><category term="scanner"/><category term="scanning"/><category term="schrems II"/><category term="search"/><category term="social distancing"/><category term="song"/><category term="spending"/><category term="standards"/><category term="supplementary measures"/><category term="testing"/><category term="text fragments"/><category term="third countries"/><category term="touchscreens"/><category term="training data"/><category term="upskilling"/><category term="video"/><category term="website"/><category term="women"/><title type='text'>Kuan0</title><subtitle type='html'>Half lawyer, half geek, mostly harmless</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://blog.kuan0.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default?start-index=26&amp;max-results=25'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>84</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-6215050000370923209</id><published>2025-03-16T16:02:00.000+00:00</published><updated>2025-03-16T16:02:06.840+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Canon"/><category scheme="http://www.blogger.com/atom/ns#" term="fix"/><category scheme="http://www.blogger.com/atom/ns#" term="MF Toolbox"/><category scheme="http://www.blogger.com/atom/ns#" term="MFToolbox"/><category scheme="http://www.blogger.com/atom/ns#" term="scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="scanning"/><category scheme="http://www.blogger.com/atom/ns#" term="solution"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows11"/><title type='text'>Canon MF Toolbox - solution if it&#39;s not working!</title><content type='html'>Here&#39;s the fix for Canon multi-function devices&#39; scanning software, MF Toolbox, not working since late 2024/2025. For me it opened, but &lt;i&gt;nothing&lt;/i&gt; happened whatever button I clicked, PDF, scan, save....&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAkKy9chONgPUQDvJzYRUySlRclbjHTQj4p81ujgUJl0AFWOzm9jWEXW6m6BXHy8a-RVBDprz54sILBNw_c7CniyFXKmrbYvQxXTyefxAb5dPJaCrZiFjAl91Y2Z_wrzwXujfg1ilGdEjZprIJYoGehAgsPkRc8YQKC95xy2OfqzcXdVsPJI70cmHeQKQ/s561/mftoolbox.png&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;197&quot; data-original-width=&quot;561&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAkKy9chONgPUQDvJzYRUySlRclbjHTQj4p81ujgUJl0AFWOzm9jWEXW6m6BXHy8a-RVBDprz54sILBNw_c7CniyFXKmrbYvQxXTyefxAb5dPJaCrZiFjAl91Y2Z_wrzwXujfg1ilGdEjZprIJYoGehAgsPkRc8YQKC95xy2OfqzcXdVsPJI70cmHeQKQ/s16000/mftoolbox.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&amp;nbsp;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;span style=&quot;color: black; text-align: left;&quot;&gt;I tried many online suggestions, none worked. The only effective one, finally, was &lt;a href=&quot;https://superuser.com/questions/384991/why-wont-any-button-in-mf-toolbox-scanning-software-for-canon-mf3010-do-anyth&quot;&gt;one from 2012&lt;/a&gt;! For a Windows 11 (and probably 10) computer, add this to your path -&amp;nbsp;&lt;/span&gt;C:\Windows\twain_32\MF4100 (or whatever is in the twain_32 subfolder for your device, although it&#39;s likely to be MF4100 - just look in that Windows twain_32 subfolder).&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;How to add something to your path in Windows?&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Press a Win key on your keyboard&lt;/li&gt;&lt;li&gt;Type: env&lt;/li&gt;&lt;li&gt;You should see something like this:&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgre5hlw1_41mjxHQRyfFrDGe8g2_nNLYrgb6rcjrpqKRnPp0NG6XQb540tAITpFx_VyqpqmMUCBlSO9-K9F7hpGb91u6e9npVdWrapj8tN9mWuoUTFmDsN1qIvNIwsQsmZit8qB1yhTX5yjXRPkkI4t7HR-iEFBjRjurD-WjZIF7FOovVdyWWNf4fQl68/s956/2envVar.png&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;371&quot; data-original-width=&quot;956&quot; height=&quot;212&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgre5hlw1_41mjxHQRyfFrDGe8g2_nNLYrgb6rcjrpqKRnPp0NG6XQb540tAITpFx_VyqpqmMUCBlSO9-K9F7hpGb91u6e9npVdWrapj8tN9mWuoUTFmDsN1qIvNIwsQsmZit8qB1yhTX5yjXRPkkI4t7HR-iEFBjRjurD-WjZIF7FOovVdyWWNf4fQl68/w546-h212/2envVar.png&quot; width=&quot;546&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Click on &quot;Edit the system environment variables&quot; (left or right one, it doesn&#39;t matter)&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style=&quot;text-align: left;&quot;&gt;You should see something like this, entitled System Properties:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD8w_mXOm9fDa1KFVnL0Yju-pIPjXd2x7ozKoofNXsyPaa0iEy7DFhaeEh2Mx4oDMfMXbY8aaUv6YDaPNH5CSvpQetAB3vuGaYOXzmFQ0LEGXUXTYz3Gwcr5jHzAg96O5xTwSRzEisAU7p7pBVA5jvzlTNkjY9gZBjUnD4MMBwkF6YSQ-yU2421SHntDM/s572/2sysProp.png&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;572&quot; data-original-width=&quot;546&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD8w_mXOm9fDa1KFVnL0Yju-pIPjXd2x7ozKoofNXsyPaa0iEy7DFhaeEh2Mx4oDMfMXbY8aaUv6YDaPNH5CSvpQetAB3vuGaYOXzmFQ0LEGXUXTYz3Gwcr5jHzAg96O5xTwSRzEisAU7p7pBVA5jvzlTNkjY9gZBjUnD4MMBwkF6YSQ-yU2421SHntDM/w611-h640/2sysProp.png&quot; width=&quot;611&quot; /&gt;&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div&gt;Click the Environment Variables button (bottom right)&lt;/div&gt;&lt;/li&gt;&lt;li&gt;You&#39;ll see something like this, entitled Environment Variables, with a list of items under Variable. One is named Path, highlighted below (I&#39;ve blanked out the rest):&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;ul&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZfpUJWKtx1IQXDvGMKM7-AfTKGLjEPULujy9e43kjVS__2hCdc-qV6Pm-nVkLC9_qzKU42ez4Q62tTR6OmDaZCNwxfcHWvwJCA_pjCy_Ev6iSvbAioJ9WM4A0RXo8jDUbV9drMQBG0m1sLjvvke_0uTfsjHTz4bSbeHIlM7yFqWg81sJ6HnmVItKp9YQ/s777/4choosePath.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;777&quot; data-original-width=&quot;706&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZfpUJWKtx1IQXDvGMKM7-AfTKGLjEPULujy9e43kjVS__2hCdc-qV6Pm-nVkLC9_qzKU42ez4Q62tTR6OmDaZCNwxfcHWvwJCA_pjCy_Ev6iSvbAioJ9WM4A0RXo8jDUbV9drMQBG0m1sLjvvke_0uTfsjHTz4bSbeHIlM7yFqWg81sJ6HnmVItKp9YQ/w582-h640/4choosePath.png&quot; width=&quot;582&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Click on Path. Then click the first Edit button just below its box (or, just doubleclick on Path)&lt;/li&gt;&lt;li&gt;You&#39;ll see something like this, entitled Edit environment variables, with a list under it (again I&#39;ve blanked out some info):&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ1EeaegTric8HztyyPR4LsB28SeGOSu65cjnCpITseeFsiizr7Ha58rbkoUkZHx0f25N5nnbshgLFbT9QcE3kdDGax6lliXIR-tyuiQFjcSfFHsdMxEi35Hqziwv5CyVn7exq4B4-RIY0tOw4hin2Uwwfa_jMHjqXSd21lXZ2xMolMa6Zhl6uIdkctbQ/s664/2editEnv.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;664&quot; data-original-width=&quot;602&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ1EeaegTric8HztyyPR4LsB28SeGOSu65cjnCpITseeFsiizr7Ha58rbkoUkZHx0f25N5nnbshgLFbT9QcE3kdDGax6lliXIR-tyuiQFjcSfFHsdMxEi35Hqziwv5CyVn7exq4B4-RIY0tOw4hin2Uwwfa_jMHjqXSd21lXZ2xMolMa6Zhl6uIdkctbQ/w580-h640/2editEnv.png&quot; width=&quot;580&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Click on New, then type in or paste the path to the twain_32 MF4100 subfolder which, for me, was as above:&lt;br /&gt;C:\Windows\twain_32\MF4100&lt;/li&gt;&lt;li&gt;You&#39;ll see something like this, with the added info now at the bottom of the list on the left:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiw2wZyONgYfah39smfX48kZmoUdYcm1jGjzxhEG5kP_US7LeVfgQ185VI-iB2Q3-aTD00diMnjS2e6bFqiJQ7ocx4dhJc_xeZDJE9jVqGiz_dnWrLcsIVfKpkBT8h13dQmpqyekOW6SW7lMEnDBUtYz6DowTeHJcBVINPMJSc5mh3okKmXOYIsTL1dWNE/s664/MF-path.png&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;664&quot; data-original-width=&quot;602&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiw2wZyONgYfah39smfX48kZmoUdYcm1jGjzxhEG5kP_US7LeVfgQ185VI-iB2Q3-aTD00diMnjS2e6bFqiJQ7ocx4dhJc_xeZDJE9jVqGiz_dnWrLcsIVfKpkBT8h13dQmpqyekOW6SW7lMEnDBUtYz6DowTeHJcBVINPMJSc5mh3okKmXOYIsTL1dWNE/w580-h640/MF-path.png&quot; width=&quot;580&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Now, click OK and just keep clicking OK (I counted 3 times altogether clicking OK) till you come out of the Environmental Variables box&lt;/li&gt;&lt;li&gt;For me, that was it! MF Toolbox then started working properly again, I didn&#39;t even need to restart my computer.&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;I hope this helps others, it&#39;s been driving me mad for months!&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/6215050000370923209'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/6215050000370923209'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2025/03/canon-mf-toolbox-solution-if-its-not.html' title='Canon MF Toolbox - solution if it&#39;s not working!'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAkKy9chONgPUQDvJzYRUySlRclbjHTQj4p81ujgUJl0AFWOzm9jWEXW6m6BXHy8a-RVBDprz54sILBNw_c7CniyFXKmrbYvQxXTyefxAb5dPJaCrZiFjAl91Y2Z_wrzwXujfg1ilGdEjZprIJYoGehAgsPkRc8YQKC95xy2OfqzcXdVsPJI70cmHeQKQ/s72-c/mftoolbox.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-3777537592292593607</id><published>2025-02-09T14:42:00.004+00:00</published><updated>2025-10-05T20:00:44.549+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AI"/><category scheme="http://www.blogger.com/atom/ns#" term="AI literacy"/><category scheme="http://www.blogger.com/atom/ns#" term="employees"/><category scheme="http://www.blogger.com/atom/ns#" term="EU AI Act"/><category scheme="http://www.blogger.com/atom/ns#" term="training"/><category scheme="http://www.blogger.com/atom/ns#" term="upskilling"/><title type='text'>AI literacy: EU AI Act </title><content type='html'>&lt;p&gt;The EU AI Act&#39;s &lt;a href=&quot;https://bit.ly/eu-aiact#4&quot;&gt;&quot;AI literacy&quot; obligation&lt;/a&gt; applied from &lt;u&gt;2 Feb 25&lt;/u&gt;, alongside its&amp;nbsp;&lt;a href=&quot;https://bit.ly/eu-aiact#5&quot;&gt;prohibition on certain AI uses&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;http://bit.ly/eu-aiactdates&quot;&gt;commencement dates 1-pager&lt;/a&gt;).&amp;nbsp;But what, if anything, should you do about it? Points to consider:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Who&#39;s caught?&lt;/b&gt;&amp;nbsp;This obligation applies to &quot;&lt;u&gt;providers&lt;/u&gt;&quot; and, especially, &quot;&lt;u&gt;deployers&lt;/u&gt;&quot; (i.e. users) of &lt;u&gt;AI systems&lt;/u&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;For non-compliance, you &lt;u&gt;can&#39;t&lt;/u&gt; be fined yet (fining provisions don&#39;t kick in till &lt;u&gt;2 Aug 2025&lt;/u&gt;), or maybe even not at all (Art.4 isn&#39;t listed in &lt;a href=&quot;http://bit.ly/eu-aiact#c12&quot;&gt;Ch.12&lt;/a&gt; on penalties, and it&#39;s unclear whether individual EU Member States can or will penalise breach of this obligation - we&#39;ll find out by &lt;u&gt;2 Aug 2026&lt;/u&gt;!)&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;But...&lt;/b&gt;&amp;nbsp;&lt;b&gt;train anyway? &lt;/b&gt;However, if you use any AI system caught by the EU AI Act, an AI upskilling/training and awareness program for staff is good practice and should help to boost your business&#39;s competitiveness as well as legal compliance, so you may want to roll it out anyway - if not yet, then ideally by 2 Aug 2026&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Who?&lt;/b&gt; Train&amp;nbsp;&lt;u&gt;at least&lt;/u&gt;&amp;nbsp;staff/contractors&amp;nbsp;&lt;u&gt;developing/adapting/integrating, operating/maintaining or using&lt;/u&gt;&amp;nbsp;any high-risk AI systems (including &lt;u&gt;third-party AI systems&lt;/u&gt;), and also train staff providing&amp;nbsp;&lt;u&gt;human oversight&lt;/u&gt;&amp;nbsp;of AI; and ensure they have &lt;u&gt;appropriate authority&lt;/u&gt; to perform their stasks properly. Train them similarly even if your AI systems &lt;u&gt;aren&#39;t&lt;/u&gt; high-risk (the Art.4 AI literacy obligation applies to all AI systems)&lt;/li&gt;&lt;li&gt;&lt;b&gt;What on?&amp;nbsp;&lt;/b&gt;Train them (as appropriate to their role, technical knowledge, experience, education and training) on AI technicalities, use/safeguards, and interpretation of output, as well raising their awareness about AI&#39;s opportunities, risks&amp;nbsp;and possible harms, taking into account the context the relevant AI system is to be used in, and the persons or groups of persons on whom your AI system is to be used&lt;/li&gt;&lt;ul&gt;&lt;li&gt;The &quot;AI literacy&quot; definition (below) mentions skills, knowledge and understanding, &quot;taking into account&quot; AI Act rights and obligations, to make an &lt;u&gt;informed deployment&lt;/u&gt; of AI systems. This might imply that relevant staff should also be trained on what are your &lt;u&gt;obligations under the AI Act&lt;/u&gt;&amp;nbsp;as deployer/provider, at least to a basic level - even engineers who aren&#39;t in the Legal/Regulatory/Compliance teams&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;How?&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Others&#39; experiences&lt;/b&gt;. To see what other organisations are doing on AI literacy, you can review the&amp;nbsp;&lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/library/living-repository-foster-learning-and-exchange-ai-literacy&quot;&gt;Commission&#39;s &quot;living repository&quot; compilation of AI literacy practices&lt;/a&gt;&amp;nbsp;of many organisations (15 currently) from different sectors and of different sizes (&lt;a href=&quot;https://ec.europa.eu/newsroom/dae/redirection/document/112203&quot;&gt;direct link&lt;/a&gt;). &lt;b&gt;&lt;i&gt;Added&lt;/i&gt;&lt;/b&gt;: on 2 Apr 25 the Commission conducted a &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/news/new-survey-gather-practices-ai-literacy-living-repository&quot;&gt;survey&lt;/a&gt;&amp;nbsp;to gather practices for the repository.&lt;br /&gt;Also consider attending/viewing the &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/events/third-ai-pact-webinar-ai-literacy&quot;&gt;AI Pact webinar on AI literacy&lt;/a&gt; on 20 Feb 25 (&lt;a href=&quot;https://www.youtube.com/live/Dyf4ZVts9HY&quot;&gt;YouTube livestream&lt;/a&gt;). If you don&#39;t have enough internal resources/expertise to train your staff, external third-party resources are available, but do check that whoever you engage is sufficiently knowledgeable. There are now many out there who offer AI training (nice market for that since ChatGPT, and it can only get bigger!) - but how well qualified or expert are they? A lot of big well-known AI companies already provide online AI training (typically tailored to their own services but covering the basics too), those are often free, so it&#39;s worth checking them out.&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;AI jargon.&lt;/b&gt; My free&amp;nbsp;&lt;a href=&quot;http://bit.ly/aijargon&quot;&gt;YouTube video demystifying key AI jargon/terminology&lt;/a&gt; may also be of use😉, do incorporate it if you wish&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;What else?&lt;/b&gt; Consider contributing to any&amp;nbsp;&lt;u&gt;sectoral/industry initiative&lt;/u&gt;s on training/awareness of people (&quot;affected persons&quot;) who may be affected by your use of AI systems, and/or of other actors in the AI value chain&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Surely &quot;affected person&quot;&amp;nbsp;won&#39;t be making any &quot;&lt;u&gt;deployment&quot;&lt;/u&gt; of AI systems, so the &quot;AI literacy&quot; definition doesn&#39;t work very well in relation to them... it seems to be more awareness-raising on AI opportunities and risks/harms rather than training, there&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;What to monitor for?&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Monitor relevant &lt;u&gt;Member States&#39; national laws&lt;/u&gt; for any local penalties that might be imposed for infringement of this obligation (seems unlikely, but you never know)&lt;/li&gt;&lt;li&gt;Watch out for any &lt;u&gt;voluntary codes of practice&lt;/u&gt; on promoting AI literacy &quot;facilitated&quot; by the EU AI Office/relevant Member States under &lt;a href=&quot;http://bit.ly/eu-aiact#95.2&quot;&gt;Art.95(2)&lt;/a&gt;(c), and take on board anything from them if you can&lt;/li&gt;&lt;li&gt;The AI Board is &lt;a href=&quot;http://bit.ly/eu-aiact#65.2&quot;&gt;supposed to&lt;/a&gt; support the Commission in promoting AI literacy, public awareness and understanding of the benefits, risks, safeguards and rights and obligations in relation to the use of AI systems. If and when they put anything out, again see whether what they produce can usefully be incorporated into your own AI literacy program.&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;(&lt;i&gt;Added&lt;/i&gt;) Update - more resources&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Commission Q&lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/policies/ai-talent-skills-and-literacy&quot;&gt;&amp;amp;A / FAQs on AI literacy&lt;/a&gt;&amp;nbsp;- worth reviewing&lt;/li&gt;&lt;li&gt;Commission/OECD&amp;nbsp;&lt;a href=&quot;https://education.ec.europa.eu/event/empowering-learners-for-the-age-of-ai-launch-of-the-draft-ai-literacy-framework-and-stakeholder-consultations&quot;&gt;AI literacy framework for primary and secondary education&lt;/a&gt; (&lt;a href=&quot;https://ailiteracyframework.org/&quot;&gt;draft&lt;/a&gt;; &lt;a href=&quot;https://school-education.ec.europa.eu/en/discover/news/give-your-feedback-new-ai-literacy-framework&quot;&gt;feedback request&lt;/a&gt;, June 25)&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/policies/ai-talent-skills-and-literacy&quot;&gt;Commission&#39;s general webpage on AI literacy, skills, talent&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Cedefop &lt;a href=&quot;https://www.cedefop.europa.eu/nl/publications/9201&quot;&gt;policy brief on AI skills&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p&gt;&lt;u&gt;Key background info for ease of reference&lt;/u&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;http://bit.ly/eu-aiact#4&quot;&gt;Art.4 AI literacy obligation&lt;/a&gt;: &lt;b&gt;Providers&lt;/b&gt; and &lt;b&gt;deployers &lt;/b&gt;of AI systems shall take measures to ensure, to their best extent, a sufficient level of AI literacy of their &lt;b&gt;staff and other persons dealing with the operation and use of AI systems on their behalf&lt;/b&gt;, taking into account their &lt;b&gt;technical knowledge, experience, education and training&lt;/b&gt; and the &lt;b&gt;context &lt;/b&gt;the AI systems are to be used in, and considering the persons or groups of persons &lt;b&gt;on whom the AI systems are to be used&lt;/b&gt;.&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://bit.ly/eu-aiact#r91&quot;&gt;Rec.91&lt;/a&gt;: ...&amp;nbsp;&lt;b&gt;deployers &lt;/b&gt;should ensure that the persons assigned to &lt;b&gt;implement the instructions &lt;/b&gt;for use [of high-risk AI systems] and &lt;b&gt;human oversight&lt;/b&gt; as set out in this Regulation have the necessary competence, in particular an adequate level of &lt;b&gt;AI literacy, training and authority&lt;/b&gt; to properly fulfil those tasks...&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;u&gt;&quot;AI literacy&quot; &lt;a href=&quot;https://bit.ly/eu-aiact#3.56&quot;&gt;definition&lt;/a&gt;&lt;/u&gt;: skills, knowledge and understanding that allow &lt;b&gt;providers&lt;/b&gt;, &lt;b&gt;deployers &lt;/b&gt;and &lt;b&gt;affected persons&lt;/b&gt;, taking into account their respective &lt;b&gt;rights and obligations&lt;/b&gt; in the context of this Regulation, to make an &lt;b&gt;informed deployment&lt;/b&gt; &lt;b&gt;of AI systems&lt;/b&gt;, as well as to &lt;b&gt;gain awareness&lt;/b&gt; about the &lt;b&gt;opportunities and risks of AI and possible harm&lt;/b&gt; it can cause&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://bit.ly/eu-aiact#r20&quot;&gt;Rec.20&lt;/a&gt;: In order to obtain the greatest benefits from AI systems while protecting fundamental rights, health and safety and to enable democratic control, AI literacy should equip &lt;b&gt;providers, deployers and affected persons&lt;/b&gt; with the necessary notions to make informed decisions regarding AI systems. Those notions may vary with regard to the relevant &lt;b&gt;context&lt;/b&gt; and can include understanding the &lt;b&gt;correct application of technical elements&lt;/b&gt; during the AI system’s &lt;b&gt;development phase&lt;/b&gt;, the &lt;b&gt;measures &lt;/b&gt;to be applied &lt;b&gt;during its use&lt;/b&gt;, the suitable ways in which to &lt;b&gt;interpret the AI system’s output&lt;/b&gt;, and, in the case of &lt;b&gt;affected persons&lt;/b&gt;, the &lt;b&gt;knowledge necessary to understand how decisions taken with the assistance of AI will have an impact&lt;/b&gt; on them. In the context of the application this Regulation, AI literacy should provide &lt;b&gt;all relevant actors in the AI value chain&lt;/b&gt; with the insights required to ensure the appropriate compliance and its correct enforcement. Furthermore, the wide implementation of AI literacy measures and the introduction of appropriate follow-up actions could contribute to improving working conditions and ultimately sustain the consolidation, and innovation path of trustworthy AI in the Union. The European Artificial Intelligence Board (the ‘Board’) should support the Commission, to promote AI literacy tools, public awareness and understanding of the benefits, risks, safeguards, rights and obligations in relation to the use of AI systems. In cooperation with the relevant stakeholders, the Commission and the Member States should facilitate the drawing up of &lt;b&gt;voluntary codes of conduct to advance AI literacy among persons dealing with the development, operation and use of AI&lt;/b&gt;.&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/3777537592292593607'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/3777537592292593607'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2025/02/ai-literacy-eu-ai-act.html' title='AI literacy: EU AI Act '/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-3227582388220749430</id><published>2025-01-13T09:04:00.005+00:00</published><updated>2025-01-13T13:41:41.404+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="eu"/><category scheme="http://www.blogger.com/atom/ns#" term="IoT"/><category scheme="http://www.blogger.com/atom/ns#" term="laws"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="software"/><category scheme="http://www.blogger.com/atom/ns#" term="uk"/><category scheme="http://www.blogger.com/atom/ns#" term="US"/><title type='text'>Things cyber security, Q4 2024</title><content type='html'>&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;Selected things cyber security, mostly from Q4 2024, are listed below in reverse chronological order, some with descriptions. See also &lt;a href=&quot;https://blog.kuan0.com/2025/01/things-ai-q4-2024.html&quot;&gt;Things AI, Oct 2024&lt;/a&gt;, and&amp;nbsp;&lt;a href=&quot;https://blog.kuan0.com/2024/10/data-protection-cyber-security-oct-2024.html&quot;&gt;Data protection &amp;amp; cyber security, Oct 2024&lt;/a&gt;&lt;/p&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;28 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Software code, provenance&lt;/b&gt;: a &lt;a href=&quot;https://educatedguesswork.org/posts/ensuring-software-provenance/&quot;&gt;thoughtful, telling post&lt;/a&gt;, Why it&#39;s hard to trust software, but you mostly have to anyway: &quot;...the situation is fairly dire: if you&#39;re running software written by someone else—which basically everyone is—you have to trust a number of different actors. We do have some technologies which have the potential to reduce the amount you have to trust them, but we don&#39;t really have any plausible venue to reduce things down to the level where there aren&#39;t a number of single points of trust... Open source, audits, reproducible builds, and binary transparency are all good, but they don&#39;t eliminate the need to trust whoever is providing your software and you should be suspicious of anyone telling you otherwise&quot;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;21 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;International collaboration, critical infrastructure&lt;/b&gt;: the Critical Five (5 Eyes) countries &lt;a href=&quot;https://www.gov.uk/government/publications/critical-5-statement-on-security-and-resilience/critical-5-statement-on-security-and-resilience&quot;&gt;reaffirmed&lt;/a&gt; their &quot;vision of fostering collaboration across the private and government critical infrastructure communities in our five nations&quot; (see the &lt;a href=&quot;https://www.gov.uk/government/publications/critical-5-shared-narrative-on-critical-national-infrastructure/adapting-to-evolving-threats-a-summary-of-critical-5-approaches-to-critical-infrastructure-security-and-resilience-html&quot;&gt;June 24 summary&lt;/a&gt; on how they plan to modernise their approach to critical national infrastructure security and resilience). &lt;a href=&quot;https://www.cisa.gov/resources-tools/resources/critical-five-engagement&quot;&gt;CISA links&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;20 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Consumer IoT&lt;/b&gt;: the UK Department for Science, Innovation &amp;amp; Technology (DSIT) will be undertaking an interim Post-Implementation Review of the&amp;nbsp;&lt;a href=&quot;https://www.legislation.gov.uk/ukpga/2022/46&quot; style=&quot;background-color: white;&quot;&gt;Product Security and Telecommunications Infrastructure Act (PSTI)&lt;/a&gt;,&amp;nbsp;to be published &lt;i&gt;by October 2026&lt;/i&gt;. To support this, DSIT has commissioned a consultancy to condcut preparations for evaluation and research projects on the product security elements of the PSTI Act&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;19 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Training&lt;/b&gt;: the UK updated its webpage on &lt;a href=&quot;https://www.gov.uk/government/collections/cyber-security-training-for-business#full-publication-update-history&quot;&gt;cyber security training for business&lt;/a&gt; - this has links to many useful resources, such as free online staff training, a free online incident response exercise and personalised cyber action plan for SMEs/individuals, many from the UK National Cyber Security Centre&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;18 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Supply chain, vendors, defence, national security&lt;/b&gt;: the UK Ministry of Defence &lt;a href=&quot;https://assets.publishing.service.gov.uk/media/67642c2dff2c870561bde8c6/Letter_from_the_Second_Permanent_Secretary__DG_Chief_Information_Officer_and_DG_Commercial_to_Defence_industry_CEOs_Defence_Leads.pdf&quot;&gt;wrote to&lt;/a&gt;&amp;nbsp;Defence Industry CEOs/leads, asking them to review their organisations&#39; performance against the &lt;a href=&quot;https://www.ncsc.gov.uk/collection/cyber-assessment-framework/introduction-to-caf&quot;&gt;Cyber Assessment Framework&lt;/a&gt; (CAF, developed by the UK National Cyber Security Centre (NCSC)&amp;nbsp;for NIS Regulations assessments) particularly the areas of Govern, Identify, Protect, Detect, Respond and Recover; adopt Active Cyber Defence (ACD) with the NCSC and its tools including Early Warning (see 3 Dec); implement the March 24 &lt;a href=&quot;https://assets.publishing.service.gov.uk/media/669923b249b9c0597fdaff90/Defence_Standard_05-138__Issue_4_-_cyber_security_for_defence_suppliers.pdf&quot;&gt;Cyber Security Standard for Suppliers&lt;/a&gt;; and deliver Secure by Design&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;17 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Cloud, SaaS, Microsoft 365&lt;/b&gt;: the US Cyber &amp;amp; Security Infrastructure Agency (CISA) issued a web-friendly verions of its directive&amp;nbsp;Implementing Secure Practices for Cloud Services for US federal agencies, requiring deployment of its &lt;a href=&quot;https://github.com/cisagov/ScubaGear&quot;&gt;SCuBA tool&lt;/a&gt; - mentioned here &lt;a href=&quot;https://www.cisa.gov/news-events/news/cisas-scubagear-tool-improves-security-organizations-using-m365-and-surpasses-30000-downloads-0&quot;&gt;because&lt;/a&gt; this &lt;i&gt;open source&lt;/i&gt; tool, downloaded &amp;gt;30k times as at 13 Nov, automatically assesses Microsoft 365 (M365) configurations for security gaps (against CISA baselines): &lt;a href=&quot;https://www.cybersecuritydive.com/news/cloud-attacks-weak-credentials/721573/&quot;&gt;reportedly&lt;/a&gt;, &lt;i&gt;misconfigurations &lt;/i&gt;were the initial access point for 30% of cloud environment attacks in the first half of 2024. &quot;ScubaGear rapidly and thoroughly analyzes an organization’s M365 tenant configuration. It then delivers actionable security change insights and recommendations that allow the tenant administrator to close security gaps and attain a stronger defense within their M365 environment&quot;. So Microsoft 365 users could do worse than use this free tool!&lt;/li&gt;&lt;li&gt;&lt;b&gt;Cybercrime, UN Convention&lt;/b&gt;: this Convention&#39;s privacy and security issues&amp;nbsp;(law enforcement access to data) have been raised by many, including &lt;a href=&quot;https://www.edpb.europa.eu/our-work-tools/our-documents/letters/edpb-reply-open-letter-edpb-united-nations-convention-against_en&quot;&gt;by the EDPB&lt;/a&gt;, &lt;a href=&quot;https://www.edpb.europa.eu/our-work-tools/our-documents/statements/statement-52024-recommendations-high-level-group-access_en&quot;&gt;referring to &lt;/a&gt;its&amp;nbsp;Statement 5/2024 on the Recommendations of the High-Level Group on Access to Data for Effective Law Enforcement&lt;/li&gt;&lt;li&gt;&lt;b&gt;Mobile comms&lt;/b&gt;: the US Cyber &amp;amp; Security Infrastructure Agency (CISA)&lt;a href=&quot;https://www.cisa.gov/resources-tools/resources/mobile-communications-best-practice-guidance&quot;&gt;issued&lt;/a&gt; &lt;a href=&quot;https://www.cisa.gov/sites/default/files/2024-12/guidance-mobile-communications-best-practices.pdf&quot;&gt;Mobile Communications Best Practice Guidance&lt;/a&gt; after &quot;identified cyber espionage activity by People’s Republic of China (PRC) government-affiliated threat actors targeting commercial telecommunications infrastructure, specifically addressing &lt;i&gt;“highly targeted” individuals&lt;/i&gt; who are in senior government or senior political positions and likely to possess information of interest to these threat actors&quot;. While intended to assist highly-targeted individuals, its recommendations are obviously also relevant to everyone else who values their security and privacy (there were also iPhone and Android-specific recommendations, not reproduced here, see the link above):&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Use only &lt;i&gt;end-to-end encrypted communications&lt;/i&gt; (free messaging apps mentioned include Signal &quot;or simlar apps&quot;)&lt;/li&gt;&lt;li&gt;Enable Fast Identity Online (FIDO) phishing-resistant authentication like hardware-based security keys&lt;/li&gt;&lt;li&gt;Migrate away from Short Message Service (SMS)-based MFA&lt;/li&gt;&lt;li&gt;Use a password manager&lt;/li&gt;&lt;li&gt;Set a telco PIN (for login etc)&lt;/li&gt;&lt;li&gt;Regularly update the operating system and other software (i.e. patch)&lt;/li&gt;&lt;li&gt;Opt for the latest hardware version from your cell phone manufacturer&lt;/li&gt;&lt;li&gt;Do &lt;i&gt;not &lt;/i&gt;use a personal virtual private network (VPN): &quot;Personal VPNs simply shift residual risks from your internet service provider (ISP) to the VPN provider&quot;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;16 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Cybercrime, advanced persistent threats&lt;/b&gt;: a RUSI article &lt;a href=&quot;https://rusi.org/explore-our-research/publications/commentary/why-biasing-advanced-persistent-threats-over-cybercrime-security-risk&quot;&gt;points out&lt;/a&gt; that &quot;...foreign government adversaries no longer have a monopoly on sophistication or persistence. Cybercriminals have just as much if not more of an impact on the Western world...&amp;nbsp;Digital spying by foreign state adversaries is still important. However, in biasing themselves towards ‘APT versus cybercrime’, information security and cybersecurity practitioners create a false dichotomy that pushes resources, attention and support to areas that don’t always align with the greatest organisational or national risk and impacts&quot;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;13 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;CSAM, encryption:&lt;/b&gt;&amp;nbsp;the EU Council &lt;a href=&quot;https://www.consilium.europa.eu/en/press/press-releases/2024/12/13/combatting-child-sexual-abuse-council-adopts-position-on-strengthened-eu-criminal-law/&quot;&gt;agreed&lt;/a&gt; its &lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-16791-2024-INIT/en/pdf&quot;&gt;general approach&lt;/a&gt; on the proposed CSAM Directive (&lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-16674-2024-INIT/en/pdf&quot;&gt;this&lt;/a&gt; has notes on some amendments), based on which it can commence negotiations on the text with the European Parliament, but the Parliament hasn&#39;t agreed its own position internally yet, so it will be some months or longer before this Directive is adopted&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Statements on the general approach by &lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-16674-2024-ADD-2/en/pdf&quot;&gt;Austria&lt;/a&gt;, &lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-16329-2024-ADD-1/en/pdf&quot;&gt;Austria and Slovenia&lt;/a&gt;, and &lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-16674-2024-ADD-1/en/pdf&quot;&gt;Belgium, Finland, Ireland, Latvia, Luxembourg, Slovenia and Sweden&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The age old debate continues about undermining encryption to allow checking of encrypted material for any CSAM, e.g. &lt;a href=&quot;https://arstechnica.com/tech-policy/2024/12/thousands-of-child-sex-abuse-victims-sue-apple-for-lax-csam-reporting/&quot;&gt;US litigation&lt;/a&gt;&amp;nbsp;against Apple for dropping its planned CSAM scanning after privacy and surveillance concerns.&lt;/li&gt;&lt;li&gt;An &lt;a href=&quot;https://wildetruth.substack.com/p/how-much-for-mass-surveillance&quot;&gt;excellent post&lt;/a&gt; about the planned &quot;Chat Control&quot; scanning under this Directive points out: &quot;Chat Control is one example of mass screening for a low-prevalence problem — a dangerous mathematical structure. It requires breaking end-to-end encryption, the technological bedrock of digital privacy. Such a move would make mass surveillance cheap and easy again... false positives will overwhelm true positives in programs of this structure — mass screenings for low-prevalence problems under conditions of rarity, persistent uncertainty, and secondary screening harms. Under these conditions, even highly accurate such programs backfire by making huge haystacks (wrongly flagged cases, “false positives”) while missing some needles (wrongly cleared cases, “false negatives”)... when &lt;i&gt;finite investigative resources&lt;/i&gt; are tied up processing CSAM possession tips from mass scanning, they cannot be used for other investigations... This is consistent with the possibility that children are endangered by such mass screening programs &lt;i&gt;exhausting the investigative resources&lt;/i&gt; necessary to process tips that have a higher likelihood of being true positives and may otherwise be more relevant to &lt;i&gt;current &lt;/i&gt;as opposed to past abuse. Curtailing targeted investigations that might stop ongoing abuse or bigger-fish distributors in favor of processing mass scanning tips that are overwhelmingly false positives does not serve the interests of vulnerable children or society... [but] it does serve the interests of those who would like a return to cheap, easy mass digital communications surveillance...&quot;&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;Data, software, products&lt;/b&gt;: &lt;a href=&quot;https://www.ftc.gov/policy/advocacy-research/tech-at-ftc/2024/12/lenses-security-preventing-mitigating-digital-security-risks-through-data-management-software&quot;&gt;reminder&lt;/a&gt;&amp;nbsp;from the US Federal Trade Commission (FTC) that to protect security it&#39;s important to have good data management (including enforcing mandated data retention schedules and mandating data deletion, so there&#39;s less unnecessary data that could be hacked), secure software development, and secure product design for humans (including least privilege, phishing-resistant MFA)&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Financial services, incident reporting, vendors:&lt;/b&gt;&amp;nbsp;the UK Prudential Regulation Authority (PRA)&amp;nbsp;&lt;a href=&quot;https://www.fca.org.uk/publications/consultation-papers/cp24-28-operational-incident-third-party-reporting&quot;&gt;issued&lt;/a&gt;&amp;nbsp;a consultation paper &lt;a href=&quot;https://www.bankofengland.co.uk/prudential-regulation/publication/2024/december/operational-incident-and-outsourcing-and-third-party-reporting-consultation-paper&quot;&gt;CP17/24 – Operational resilience: Operational incident and outsourcing and third-party reporting&lt;/a&gt;, on proposed &quot;rules and expectations for firms to report &lt;i&gt;operational incidents&lt;/i&gt; and their &lt;i&gt;material third-party arrangements&lt;/i&gt;&quot; (deadline 14 Mar 25), with reporting thresholds (quite subjective), and a phased approach to incident reporting: initial, intermediate, final, with certain minimum information&lt;/li&gt;&lt;li&gt;&lt;b&gt;Product safety&lt;/b&gt;: the EU &lt;a href=&quot;https://eur-lex.europa.eu/eli/reg/2023/988/oj/eng&quot;&gt;General Product Safety Regulation&lt;/a&gt;&amp;nbsp;applies from this date. When assessing whether a product is a safe product, &lt;a href=&quot;https://eur-lex.europa.eu/eli/reg/2023/988/oj/eng#006.001&quot;&gt;factors to consider&lt;/a&gt;&amp;nbsp;include, &quot;when required by the nature of the product, the appropriate &lt;i&gt;cybersecurity features&lt;/i&gt; necessary to protect the product against external influences, including malicious third parties, where such an influence might have an impact on the safety of the product, including the possible loss of interconnection&quot;, particularly &lt;i&gt;digitally connected products&lt;/i&gt; likely to have an impact on &lt;i&gt;children&lt;/i&gt; (on top of sectoral laws&amp;nbsp;on cybersecurity risks affecting consumers etc)&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Detailed &lt;a href=&quot;https://www.gov.uk/government/publications/general-product-safety-regulations-northern-ireland/eu-regulation-2023988-on-general-product-safety-detailed-guidance&quot;&gt;UK guidance&lt;/a&gt;, applicable to Northern Ireland summarises it as: &quot;This Regulation requires that all consumer products placed on the NI and EU markets are safe and establishes specific obligations for businesses to ensure that safety. The Regulation applies to products placed on, or made available to, the market where there are no sector-specific provisions with the same objective&quot;&amp;nbsp; &amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;12 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Passkeys&lt;/b&gt;: these are touted as more secure than using passwords, and are increasingly being supported (see &lt;a href=&quot;https://www.kuan0.com/publications.html&quot;&gt;my book&lt;/a&gt;&amp;nbsp;and the &lt;a href=&quot;https://bit.ly/hontechbookpdf&quot;&gt;free PDF&lt;/a&gt;). Microsoft &lt;a href=&quot;https://www.microsoft.com/en-us/security/blog/2024/12/12/convincing-a-billion-users-to-love-passkeys-ux-design-insights-from-microsoft-to-boost-adoption-and-security/&quot;&gt;published&lt;/a&gt; its UX design insights to boost passkey adoption and security&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;10 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;EU Cyber Resilience Act (CRA)&lt;/b&gt;: &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/policies/cyber-resilience-act&quot;&gt;this Regulation&lt;/a&gt; entered into force (&lt;a href=&quot;https://eur-lex.europa.eu/eli/reg/2024/2847/oj/eng&quot;&gt;published in OJ&lt;/a&gt; 20 Nov 24, &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/news/cyber-resilience-act-enters-force-make-europes-cyberspace-safer-and-more-secure&quot;&gt;news item&lt;/a&gt;), requiring minimum cybersecurity requirements for any &quot;&lt;i&gt;product with digital elements&lt;/i&gt;&quot; before they can be made available on the EU market, with certain cybersecurity&amp;nbsp;&lt;i&gt;vulnerability handling&lt;/i&gt;&amp;nbsp;obligations on manufacturers, including on&amp;nbsp;&lt;i&gt;vulnerability disclosure&lt;/i&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;A &quot;&lt;i&gt;product with digital elements&lt;/i&gt;&quot; is any&amp;nbsp;&lt;i&gt;software&lt;/i&gt;&amp;nbsp;or hardware&amp;nbsp;product and its &quot;remote data processing solutions&quot;, including software or hardware components being placed on the market separately (where &quot;remote data processing&quot; is remote processing designed by the manufacturer, whose absence would prevent one of the product&#39;s functions from being performed - such as essential cloud processing). So, CRA catches not just&amp;nbsp;&lt;i&gt;IoT / smart devices&lt;/i&gt;&amp;nbsp;but also&amp;nbsp;&lt;b&gt;&lt;i&gt;software&lt;/i&gt;&lt;/b&gt;&amp;nbsp;(and is &lt;i&gt;not&lt;/i&gt; limited to consumer IoT, unlike the UK&#39;s&amp;nbsp;&amp;nbsp;&lt;a href=&quot;https://www.legislation.gov.uk/ukpga/2022/46&quot; style=&quot;background-color: white;&quot;&gt;Product Security and Telecommunications Infrastructure Act (PSTI)&lt;/a&gt;)&lt;/li&gt;&lt;li&gt;CRA applies fully from&amp;nbsp;&lt;i&gt;11 December 2027&lt;/i&gt;,&lt;b&gt;&amp;nbsp;&lt;/b&gt;but with some earlier applicable dates like&amp;nbsp;&lt;i&gt;11 September&amp;nbsp;&lt;/i&gt;&lt;i style=&quot;font-weight: bold;&quot;&gt;2026&lt;/i&gt;&amp;nbsp;for Art.14 on manufacturers&#39; obligation to report&amp;nbsp;any&amp;nbsp;&lt;i&gt;actively exploited vulnerability&lt;/i&gt;&amp;nbsp;contained in such a product: with staggered deadlines of 24 hrs, 72 hrs etc.&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;9 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Open source, malicious code, tools&lt;/b&gt;: open source code is increasingly incorporated into software, but open source packages can be malicious, or legitimate code can be accessed by attackers and &quot;poisoned&quot; to serve malicious purposes e.g. adding a backdoor for hackers. The Stack &lt;a href=&quot;https://www.thestack.technology/datadog-opensource-firewall/&quot;&gt;reported&lt;/a&gt;&amp;nbsp;that a tool, &lt;a href=&quot;https://github.com/DataDog/supply-chain-firewall&quot;&gt;DataDog&lt;/a&gt;, had been open sourced, termed as a [software] &quot;supply chain firewall&quot; that scans Python packages being installed, and blocks packages know to be malicious based on the tool provider&#39;s own observations or certain open source feeds&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;5 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Consumer IoT&lt;/b&gt;: the UK&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/government/publications/cyber-security-of-consumer-iot-manufacturer-survey&quot;&gt;published&lt;/a&gt;&amp;nbsp;a survey it had commissioned&amp;nbsp;&lt;i&gt;before&lt;/i&gt;&amp;nbsp;the&amp;nbsp;&amp;nbsp;&lt;a href=&quot;https://www.legislation.gov.uk/ukpga/2022/46&quot; style=&quot;background-color: white;&quot;&gt;Product Security and Telecommunications Infrastructure Act (PSTI)&lt;/a&gt;&amp;nbsp;came into force, to map and analyse the market for consumer connectable products, and collect and analyse evidence on the compliance of manufacturers with the PSTI legal regime, as well as evidence on awareness and impacts of the legislation. It outlines well the PSTI compliance challenges (which many may be familiar with!). And see the related&amp;nbsp;&lt;a href=&quot;https://assets.publishing.service.gov.uk/media/673f786259aab43310b95af8/Cyber_security_of_consumer_IoT_Infographic_Summary_of_manufacturer_survey.pdf&quot;&gt;infographic&lt;/a&gt;. See also 25 Nov&lt;/li&gt;&lt;li&gt;&lt;b&gt;Software patching, tools&lt;/b&gt;: one of the most critical security measures to take is&amp;nbsp;&lt;i&gt;patching&lt;/i&gt;, ensuring software is kept updated with new versions that address security vulnerabilities. Google&amp;nbsp;&lt;a href=&quot;https://security.googleblog.com/2024/12/announcing-launch-of-vanir-open-source.html&quot;&gt;released&lt;/a&gt;&amp;nbsp;a new open source security patch validation automation tool&amp;nbsp;&lt;a href=&quot;https://github.com/google/vanir&quot;&gt;Vanir&lt;/a&gt;, that helps&amp;nbsp;&lt;i&gt;Android&amp;nbsp;&lt;/i&gt;developers &quot;quickly and efficiently scan their custom platform code for missing security patches and identify applicable available patches&quot;. &quot;While initially designed for Android, Vanir can be easily adapted to other ecosystems with relatively small modifications, making it a versatile tool for enhancing software security across the board&quot;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;4 Dec 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;EU digital identity wallets&lt;/b&gt;: technical standards,&amp;nbsp;&lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/news/commission-adopts-technical-standards-cross-border-european-digital-identity-wallets&quot;&gt;adopted&lt;/a&gt;&amp;nbsp;by the Commission on 28 Nov,&amp;nbsp;for cross-border eID wallets under the&amp;nbsp;&lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A02014R0910-20241018&amp;amp;qid=1731648315513&quot;&gt;European Identity Framework&lt;/a&gt;&amp;nbsp;that was&amp;nbsp;&lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32024R1183&quot;&gt;updated&lt;/a&gt;&amp;nbsp;in 2024, were &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/library/implementing-regulation-european-digital-identity-wallets&quot;&gt;published&lt;/a&gt; in the OJ under 5 implementing regulations with rules on eID Wallets&#39; integrity and core functionalities, on eID Wallets solutions&#39; protocols and interfaces and on person identification data and electronic attestations of attributes of eID Wallets, plus reference standards, specifications and procedures for a certification framework for eID Wallets, and obligations for notifications to the Commission concerning the eID Wallet ecosystem&lt;/li&gt;&lt;li&gt;&lt;b&gt;Measures, metrics&lt;/b&gt;: how can organisations measure to what extent their cyber security measures are effective? The US National Institute of Standards and Technology (NIST) published updated guidance on how an organization can develop&amp;nbsp;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&quot;information security measures to identify the adequacy of in-place security policies, procedures, and controls. It explains the measures prioritization process and how to evaluate measures&quot;: &lt;a href=&quot;https://csrc.nist.gov/pubs/sp/800/55/v1/final&quot;&gt;Volume 1 — Identifying and Selecting Measures&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&quot;an information security measurement program with a flexible structure for approaching activities around the development and implementation of information security measures&quot;:&amp;nbsp;&lt;a href=&quot;https://csrc.nist.gov/pubs/sp/800/55/v2/final&quot;&gt;Volume 2 — Developing an Information Security Measurement Program&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;/ul&gt;
&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;3 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Comms infrastructure&lt;/b&gt;: several US and other agencies &lt;a href=&quot;https://www.cisa.gov/news-events/news/cisa-nsa-fbi-and-international-partners-publish-guide-protecting-communications-infrastructure&quot;&gt;published&lt;/a&gt;&amp;nbsp;a joint guide &lt;a href=&quot;https://www.cisa.gov/resources-tools/resources/enhanced-visibility-and-hardening-guidance-communications-infrastructure&quot;&gt;Enhanced Visibility and Hardening Guidance for Communications Infrastructure&lt;/a&gt;, &quot;that provides best practices to protect against a People’s Republic of China (PRC)-affiliated threat actor that has compromised networks of major global telecommunications providers. The recommended practices are for network engineers and defenders of communications infrastructure to strengthen visibility and harden network devices against this broad and significant cyber espionage campaign... Although tailored to &lt;i&gt;communications infrastructure sector&lt;/i&gt;, this guidance may also apply to organizations with &lt;i&gt;on-premises enterprise equipment&lt;/i&gt;&quot;&lt;/li&gt;&lt;li&gt;&lt;b&gt;EU cybersecurity, threats&lt;/b&gt;: EU security agency ENISA &lt;a href=&quot;https://www.enisa.europa.eu/news/eus-first-ever-report-on-the-state-of-cybersecurity-in-the-union&quot;&gt;published&lt;/a&gt;&amp;nbsp;its first NIS2 biennial &lt;a href=&quot;https://www.enisa.europa.eu/news/eus-first-ever-report-on-the-state-of-cybersecurity-in-the-union&quot;&gt;report&lt;/a&gt; on the state of EU cybersecurity. This reported &quot;substantial cyber threat level to the EU, highlighting discovered vulnerabilities exploited by threat actors targeting EU entities...&quot; and made several policy recommendations on strengthening EU cyber skills/workforce and addressing supply chain security&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;UK cybersecurity, threats&lt;/b&gt;: the UK National Cyber Security Centre (NCSC) &lt;a href=&quot;https://www.ncsc.gov.uk/collection/ncsc-annual-review-2024&quot;&gt;published&lt;/a&gt; its &lt;a href=&quot;https://www.ncsc.gov.uk/files/NCSC_Annual_Review_2024.pdf&quot;&gt;Annual Review 2024&lt;/a&gt;. Its head &lt;a href=&quot;https://www.ncsc.gov.uk/news/risk-facing-uk-widely-underestimated-cyber-chief-to-warn-in-first-major-speech&quot;&gt;stressed&lt;/a&gt; in an accompanying speech the &quot;clearly widening gap between the exposure and threat we face, and the defences that are in place to protect us... We need all organisations, public and private, to see cyber security as both an essential foundation for their operations and a driver for growth. To view cyber security not just as a ‘necessary evil’ or compliance function, but as a business investment, a catalyst for innovation and an integral part of achieving their purpose... Hostile activity in UK cyberspace has increased in frequency, sophistication and intensity... Actors are increasingly using our technology dependence against us, seeking to cause maximum disruption and destruction... And yet, despite all this, we believe the severity of the risk facing the UK is being widely underestimated... There is no room for complacency about the severity of state-led threats or the volume of the threat posed by cyber criminals. The defence and resilience of critical infrastructure, supply chains, the public sector and our wider economy must improve...&quot;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;The NCSC&#39;s incident management (IM) team &lt;i&gt;issued 542 bespoke notifications&lt;/i&gt; to&amp;nbsp;organisations of a cyber incident impacting them, providing advice
and mitigation guidance (cf. 258 in 2023). Almost half related to &lt;i&gt;pre-ransomware activity&lt;/i&gt;, enabling organisations to detect and
remove precursor malware before ransomware was deployed.&lt;/li&gt;&lt;li&gt;Top sectors
reporting ransomware activity into the NCSC were academia,
manufacturing, IT, legal, charities and construction. &quot;We received 317 reports
of ransomware activity, either directly from impacted organisations, or from
our partners (an increase on 297 last year). These were triaged into &lt;i&gt;20 NCSC-managed
incidents&lt;/i&gt;, of which &lt;i&gt;13 were nationally significant&lt;/i&gt;. These included high-profile
incidents impacting the British Library and NHS trusts&quot;&lt;/li&gt;&lt;li&gt;The NCSC was made aware of 347 reports of activity that involved the &lt;i&gt;exfiltration or extortion of data&lt;/i&gt;&lt;/li&gt;&lt;li&gt;The IM team issued &lt;i&gt;~12,000 alerts&lt;/i&gt; about vulnerable services through its Early Warning service (an automated NCSC threat notification service, free to UK organisations - &lt;a href=&quot;https://www.ncsc.gov.uk/section/active-cyber-defence/early-warning&quot;&gt;do sign up!&lt;/a&gt;). Exploitation of zero-days CVE-2023-20198 (Cisco IOS XE) and CVE-2024-3400 (Palo Alto Networks PAN OS) also resulted in &lt;i&gt;6 nationally significant incidents&lt;/i&gt; which the IM team helped manage&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;2 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Cybersecurity measures:&lt;/b&gt;&amp;nbsp;the US Cyber &amp;amp; Security Infrastructure Agency (CISA)&amp;nbsp;&lt;a href=&quot;https://www.cisa.gov/news-events/news/updated-tic-30-security-capabilities-catalog-scc-v32&quot;&gt;updated&lt;/a&gt; its Trusted Internet Connections (TIC) 3.0 &lt;a href=&quot;https://www.cisa.gov/news-events/news/updated-tic-30-security-capabilities-catalog-scc-v32&quot;&gt;Security Capabilities Catalog (SCC) version 3.2&lt;/a&gt;, based on the new National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) Version 2.0 mapping updates. TIC 3.0 SCC provides a list of &lt;i&gt;deployable security controls, security capabilities, and best practices,&lt;/i&gt;&amp;nbsp;intended to guide secure implementations and help US federal agencies satisfy program requirements within discrete networking environments, but is of more general use/interest&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Encryption&lt;/b&gt;: this was Global Encryption Day: the Global Encryption Coalition &lt;a href=&quot;https://www.globalencryption.org/2024/12/global-encryption-day-draws-the-support-of-policymakers-and-human-rights-leaders/&quot;&gt;reported&lt;/a&gt; on the support of policymakers and others for encryption&amp;nbsp;, including for the protection of children&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;FS, DORA&lt;/b&gt;: the EU&#39;s &lt;a href=&quot;https://eur-lex.europa.eu/eli/reg/2022/2554/oj/eng&quot;&gt;DORA Regulation&lt;/a&gt; on digital operational resilience for the financial sector applies in the EU from 17 Jan 2025. Much secondary legislation on certain detailed requirements has been made under it (see &lt;a href=&quot;https://finance.ec.europa.eu/document/download/7a2d42d8-4b48-4e2e-9b4c-c4e9107686d1_en?filename=dora-level-2-measures-full_en.pdf&quot;&gt;list&lt;/a&gt; as at 4 Dec 24). On 2 Dec, an &lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32024R2956&quot;&gt;implementing regulation&lt;/a&gt; was published in the OJ on technical standards for standard templates for the &lt;i&gt;register of information&lt;/i&gt; that in-scope financial entities must maintain in relation to their ICT services and ICT service providers, including providers&#39; subcontractors in certain cases, such as details of their&amp;nbsp;&lt;i&gt;contracts&lt;/i&gt;&amp;nbsp;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Financial service entities&#39; &lt;i&gt;contracts &lt;/i&gt;with their ICT service providers should also be updated to comply with DORA&#39;s requirements, and some providers are directly regulated under DORA - not discussed here&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;Managed security services, certifications; EU&lt;/b&gt;: the Council &lt;a href=&quot;https://www.consilium.europa.eu/en/press/press-releases/2024/12/02/cybersecurity-package-council-adopts-new-laws-to-strengthen-cybersecurity-capacities-in-the-eu/&quot;&gt;approved&lt;/a&gt;&amp;nbsp;a directly-applicable Regulation&amp;nbsp;&lt;a href=&quot;https://data.consilium.europa.eu/doc/document/PE-93-2024-INIT/en/pdf&quot;&gt;amending&lt;/a&gt;&amp;nbsp;the EU Cybersecurity Act (CSA) to enable future adoption of &lt;i&gt;European certification schemes&lt;/i&gt; for managed security services (MSS, like &lt;i&gt;incident handling, penetration testing, security audits, consulting advice&lt;/i&gt; on technical support), increasingly important for cybersecurity incidents&#39;&amp;nbsp;prevention, detection, response, and recovery. Awaiting the CSA&#39;s broader evaluation &lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-15878-2024-ADD-1/en/pdf&quot;&gt;by the Commission&lt;/a&gt;, this targeted amendment aims to enable establishment of such European certification schemes to help increase MSSs&#39; quality, comparability and trustworthiness, and avoid fragmentation as some Member States have initiated national certification schemes for such services&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Not law yet, to awaiting OJ publication&lt;/li&gt;&lt;li&gt;The Council also approved a &lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CONSIL:PE_94_2024_INIT&quot;&gt;Cyber Solidarity Act Regulation&lt;/a&gt;&amp;nbsp;(also awaiting OJ) to strengthen EU/Member State cooperation and resilience&amp;nbsp;against cyber threats, e.g. creating&amp;nbsp;a &lt;i&gt;cyber security alert system&lt;/i&gt;&amp;nbsp;pan-European infrastructure comprising national and cross-border cyber hubs responsible for detecting, sharing information&amp;nbsp;and acting on cyber threats including cross-border incidents. It also creates a &lt;i&gt;cybersecurity emergency mechanism&lt;/i&gt;&amp;nbsp;(including a EU &lt;i&gt;cybersecurity reserve&lt;/i&gt;: &lt;i&gt;private sector incident response services &lt;/i&gt;&quot;ready to intervene&quot; on significant/large-scale incidents if requested by a Member State or EU body as well as associated third countries, and &lt;i&gt;incident review mechanism&lt;/i&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;1 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Cloud, access, MFA&lt;/b&gt;: previously, cloud service providers have tended to leave it to their &lt;i&gt;customers &lt;/i&gt;to decide whether the customer wants to &lt;i&gt;require MFA&lt;/i&gt; in order for its users to access its cloud service. A very positive trend is that providers are increasingly enforcing MFA, e.g. Snowflake &lt;a href=&quot;https://www.snowflake.com/en/blog/blocking-single-factor-password-authentification/&quot;&gt;will be&lt;/a&gt; &lt;i&gt;blocking&lt;/i&gt;&amp;nbsp;attempted sign-ins using &lt;i&gt;single-factor authentication with passwords&lt;/i&gt;.&amp;nbsp;It seems likely this move by Snowflake was influenced by &amp;gt;100 of its customers, who had &lt;i&gt;not &lt;/i&gt;required MFA, being &lt;a href=&quot;https://www.cybersecuritydive.com/news/100-snowflake-customers-attacked/718454/&quot;&gt;successfully attacked&lt;/a&gt; in 2024. While it would have behoved those customers to require MFA for access to their Snowflake services, these incidents did appear to lead to some negative comments about Snowflake&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;29 Nov 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Online shopping, passwords:&lt;/b&gt;&amp;nbsp;the US CISA issued&amp;nbsp;&lt;a href=&quot;https://www.cisa.gov/news-events/news/shop-safely-online-holiday-season-tips-secure-our-world&quot;&gt;tips with reminders on best security practices&lt;/a&gt;&amp;nbsp;including updating software, using strong passwords (&quot;at least&amp;nbsp;&lt;b&gt;16 characters&lt;/b&gt;, random, and unique for each account&quot;), using a password manager and enabling MFA where offered, plus phishing warnings etc.&lt;/li&gt;&lt;ul&gt;&lt;li&gt;(Interestingly, the US NIST&#39;s&amp;nbsp;&lt;a href=&quot;https://pages.nist.gov/800-63-4/&quot;&gt;draft (for comment) of its fourth revision&lt;/a&gt;&amp;nbsp;to the four-volume suite of Special Publication 800-63, Digital Identity Guidelines of August 2024 included&amp;nbsp;&lt;a href=&quot;https://csrc.nist.gov/pubs/sp/800/63/b/4/2pd&quot;&gt;SP 800-63B-4 on Authentication &amp;amp; Authenticator Management&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://pages.nist.gov/800-63-4/sp800-63b.html&quot;&gt;another link&lt;/a&gt;), which recommended that passwords &quot;shall&quot; be at least&amp;nbsp;&lt;b&gt;8 characters&lt;/b&gt;&amp;nbsp;long and &quot;should&quot; be at least&amp;nbsp;&lt;b&gt;15 characters&lt;/b&gt;.&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;Undersea cables&lt;/b&gt;: these are essential for Internet access/usage in a globally digitalised world.&amp;nbsp;The UK, EU and 15 other partners &lt;a href=&quot;https://www.gov.uk/government/publications/new-york-joint-statement-on-the-security-and-resilience-of-undersea-cables&quot;&gt;endorsed&lt;/a&gt; shared principles in the &lt;a href=&quot;https://www.gov.uk/government/publications/new-york-joint-statement-on-the-security-and-resilience-of-undersea-cables/new-york-joint-statement-on-the-security-and-resilience-of-undersea-cables-in-a-globally-digitalized-world&quot;&gt;New York joint statement on the security and resilience of subsea cables&lt;/a&gt; at the UN General Assembly,&amp;nbsp;on working to ensure the security, reliability, interoperability, sustainability, and resiliency for the deployment, repair and maintenance of undersea cable infrastructure&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;28 Nov 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Boards, directors&lt;/b&gt;: UK National Cyber Security Centre (NCSC)&#39;s Cyber Security Toolkit for Boards: updated briefing pack &lt;a href=&quot;https://www.ncsc.gov.uk/blog-post/cyber-security-toolkit-for-boards-updated-briefing-pack-released&quot;&gt;released&lt;/a&gt; with insights on the ransomware attack against the British Library&lt;/li&gt;&lt;li&gt;&lt;b&gt;EU NIS2 Directive&lt;/b&gt;: this Directive, updating and expanding the NIS Directive, should have been implemented by Member States by 17 Oct 24, but it wasn&#39;t (&lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/NIM/?uri=CELEX:32022L2555&quot;&gt;Europa list&lt;/a&gt; of those that &lt;i&gt;have&lt;/i&gt;&amp;nbsp;notified the Commission of their NIS2 transposition).&lt;/li&gt;&lt;ul&gt;&lt;li&gt;The Commission&amp;nbsp;&lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/news/commission-calls-23-member-states-fully-transpose-nis2-directive&quot;&gt;decided&lt;/a&gt; to open infringement procedures for not fully implementing NIS2&amp;nbsp;by sending formal notice to &lt;i&gt;23&lt;/i&gt; Member States (Bulgaria, Czechia, Denmark, Germany, Estonia, Ireland, Greece, Spain, France, Cyprus, Latvia, Luxembourg, Hungary, Malta, Netherlands, Austria, Poland, Portugal, Romania, Slovenia, Slovakia, Finland and Sweden). The Commission has given them&amp;nbsp;two months to respond, complete their transposition and notify their measures to the Commission. &lt;a href=&quot;https://www.ncsc.gov.ie/nis2/#:~:text=Unfortunately%2C%20the%20transposition%20deadline%20for%20NIS2%20of%2017%20October%202024%20has%20not%20been%20met.&quot;&gt;Ireland hasn&#39;t yet&lt;/a&gt;&amp;nbsp;transposed NIS2 officially, but it wasn&#39;t in that list, for whatever reason&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;a href=&quot;https://blog.kuan0.com/2024/11/cyber-security-resilience-bill.html&quot;&gt;UK Cyber Security &amp;amp; Resilience Bill consultation&lt;/a&gt;: consultation closed, on UK DSIT&#39;s call for evidence on proposals to inform the Bill&lt;/li&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;26 Nov 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Awareness raising, NIS&lt;/b&gt;: EU security agency ENISA &lt;a href=&quot;https://www.enisa.europa.eu/sites/default/files/2024-11/GUIDE-C-LEVEL-Web.pdf&quot;&gt;updated&lt;/a&gt;&amp;nbsp;its guide on how to promote cyber security awareness to C-level (part of its &lt;a href=&quot;https://www.enisa.europa.eu/topics/awareness-and-cyber-hygiene/ar-in-a-box&quot;&gt;AR-in-a-box&lt;/a&gt;&amp;nbsp;DIY awareness-raising toolbox, &quot;a comprehensive solution for cybersecurity awareness activities designed to meet the needs of public bodies, operators of essential services, and both large and small private companies. It provides theoretical and practical knowledge on how to design and implement effective cybersecurity awareness&quot;) - still relevant to NIS2 of course&lt;/li&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;25 Nov 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;IoT, smart devices, vulnerability handling, PSTI&lt;/b&gt;: the IoT Security Foundation &lt;a href=&quot;https://iotsecurityfoundation.org/the-state-of-vulnerability-disclosure-policy-vdp-usage-in-global-consumer-iot-in-2024/&quot;&gt;published&lt;/a&gt;&amp;nbsp;The State of Vulnerability Disclosure Policy (VDP) Usage in Global Consumer IoT in 2024, including some coverage of the impact of the UK&amp;nbsp;&lt;a href=&quot;https://www.legislation.gov.uk/ukpga/2022/46&quot; style=&quot;background-color: white;&quot;&gt;Product Security and Telecommunications Infrastructure Act (PSTI)&lt;/a&gt;. &quot;...&lt;span style=&quot;background-color: white;&quot;&gt;the UK legislation has driven a bigger improvement [among UK retailers] than European and US retailers. Whilst the sample set maybe low, it is a consistent gauge moving faster in the right direction&quot;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;The survey indicated an increase in the proportion of&amp;nbsp;&lt;i&gt;manufacturers&amp;nbsp;&lt;/i&gt;checked that had a vulnerability disclosure policy, from 23.99% in 2023 to&amp;nbsp;&lt;i&gt;35.59%&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/i&gt;in 2024.&amp;nbsp;&lt;/span&gt;Only ~21% of companies complied with PSTI&#39;s vulnerability disclosure requirements, though that&#39;s &quot;increased significantly&quot; from the previous year.&amp;nbsp;&lt;/li&gt;&lt;li&gt;The picture&#39;s variable regarding proportion of retailers stocking products whose manufacturers support vuln disclosure.&amp;nbsp;&lt;i&gt;&lt;i&gt;Over 50%&lt;/i&gt;&lt;span style=&quot;background-color: white; font-style: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-style: normal;&quot;&gt;of IoT products stocked by several&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-style: normal;&quot;&gt;UK retailers&lt;/span&gt;&lt;span style=&quot;background-color: white; font-style: normal;&quot;&gt;&amp;nbsp;were from manufacturers that had vulnerability disclosure policies. John Lewis was the best,&lt;/span&gt;&lt;span style=&quot;background-color: white; font-style: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i&gt;93.33%&amp;nbsp;&lt;/i&gt;&lt;span style=&quot;background-color: white; font-style: normal;&quot;&gt;of its products checked were from compliant manufacturers.&amp;nbsp;&lt;/span&gt;The detail on specific manufacturers, their website statements of compliance and how some meet PSTI (or not) is worth a look&lt;/i&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&quot;There has clearly been some effect from the UK’s Product Security and Telecommunications Infrastructure Act (Part 1) requirements... but implementation seems fragmented and inconsistent. While some leading UK retailers are showing that around 90% of the IoT manufacturers they stock have vulnerability disclosure policies, there are some notable exceptions to this ‘dip test’ of the market and there are obvious differences in &lt;i&gt;online marketplaces&lt;/i&gt;. The other regions showed less promising and variable data about the product manufacturers they stocked&quot;&amp;nbsp;&lt;/span&gt;&lt;i&gt;&lt;span style=&quot;background-color: white; font-style: normal;&quot;&gt;&amp;nbsp;(the report covers manufacturers and retailers in the EU, US and Asia too - not discussed here)&lt;/span&gt;&lt;/i&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;And there remains a &quot;..gap in practice between the consumer and enterprise sectors. Whilst the consumer sector is firmly heading in the right direction, there is a stark contrast in market practice levels and continues to justify the need for consumer regulation&quot; (I&#39;d suggest &lt;i&gt;enterprise&lt;/i&gt; IoT security could still improve)&quot;.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;On individual product categories, &quot;notable laggards being Health and Fitness, Lighting and, somewhat paradoxically, Security. Those manufacturer report cards read “must do better”&quot;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: white;&quot;&gt;See also 5 Dec&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;22 Nov 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Fraud, data protection&lt;/b&gt;: the UK ICO &lt;a href=&quot;https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/11/data-protection-is-not-an-excuse-when-tackling-scams-and-fraud/&quot;&gt;emphasised&lt;/a&gt; that data protection is not an excuse when tackling scams and fraud, &quot;warning that reluctance from organisations to share personal information to tackle scams and fraud can lead to serious emotional and financial harm. Data protection law does not prevent organisations from sharing personal information, if they do so in a responsible, fair and proportionate way&quot;. It &lt;a href=&quot;https://ico.org.uk/for-organisations/uk-gdpr-guidance-and-resources/data-sharing/sharing-personal-information-when-preventing-detecting-and-investigating-scams-and-frauds/&quot;&gt;published&lt;/a&gt; &quot;new practical advice to provide clarity on data protection considerations and support organisations to share data responsibly to tackle scams and fraud&quot;, aimed at any organisation seeking to share personal information to identify, investigate and prevent fraud, especially &lt;i&gt;banks, telecommunications providers and digital platforms&lt;/i&gt;&quot;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;The same also applies to organisations disclosing potential personal data, like IP addresses and domain names, as indicators of compromise (IOCs) in threat sharing initiatives/platforms regarding &lt;i&gt;cyber threats/breaches&lt;/i&gt;, whether sectoral or otherwise, and it would have been helpful if the ICO had also made that point.&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;21 Nov 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Critical infrastructure, red teaming&lt;/b&gt;: the US Cyber &amp;amp; Security Infrastructure Agency (CISA) &lt;a href=&quot;https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-326a&quot;&gt;published&lt;/a&gt; its &lt;a href=&quot;https://www.cisa.gov/sites/default/files/2024-11/aa24-326a-enhancing-cyber-resilience-insights-from-cisa-red-team-assessment_0.pdf&quot;&gt;insights&lt;/a&gt; from a red team assessment of a US critical infrastructure organisation including lessons learned (technical controls, staff training, leadership/board: &quot;Leadership deprioritized the treatment of a vulnerability their own cybersecurity team identified, and in their risk-based decision-making, miscalculated the potential impact and likelihood of its exploitation&quot;) and technical details&lt;/li&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;18 Nov 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Passwords&lt;/b&gt;: it&#39;s interesting that, following notification of personal data breaches, the Romanian data protection supervisory authority &lt;a href=&quot;https://dataprotection.ro/?page=Comunicat_Presa_18.11.2024&amp;amp;lang=ro&quot;&gt;ordered&lt;/a&gt;&amp;nbsp;a company to take measures including (machine translation) &quot;password complexity and history policy on all customer accounts with a pre-established expiration interval&quot;. That is a decades old practice, which is &lt;i&gt;no longer &lt;/i&gt;considered good. Technical experts including the UK NCSC and US NIST recommend longer rather than more complex passwords, indeed NIST&#39;s &lt;a href=&quot;https://csrc.nist.gov/pubs/sp/800/63/b/4/2pd&quot;&gt;latest draft update&lt;/a&gt; recommends &lt;i&gt;not&lt;/i&gt;&amp;nbsp;enforcing any password complexity rules like one lowercase, one uppercase etc. &lt;a href=&quot;https://www.ncsc.gov.uk/blog-post/problems-forcing-regular-password-expiry&quot;&gt;Similarly&lt;/a&gt; with forced password changes every few months or year, which is now deprecated (e.g. &lt;a href=&quot;https://www.newscientist.com/article/2449454-forcing-people-to-change-their-passwords-is-officially-a-bad-idea/#:~:text=The%20UK&#39;s%20National%20Cyber%20Security,security%2C%E2%80%9D%20the%20report%20says.&quot;&gt;New Scientist article&lt;/a&gt;) as it reduces security by resulting in people writing down passwords, using bad passwords they can remember, etc! So it seems that some GDPR authorities could still benefit from more technical assistance/education on cybersecurity...&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;15 Nov 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;UK NIS Regulations, notified incidents&lt;/b&gt;: the ICO is the regulator for digital service providers under &lt;a href=&quot;https://www.legislation.gov.uk/uksi/2018/506&quot;&gt;NIS&lt;/a&gt; (cloud, online marketplaces, online search engines). &lt;a href=&quot;https://ico.org.uk/media/about-the-ico/disclosure-log/4031900/ic-339104-z0r5.pdf&quot;&gt;Responding&lt;/a&gt; to a freedom of information request, the ICO stated that 37 incidents were reported to the ICO as NIS incidents, including 18 incidents that were not in fact NIS incidents and 2 incidents (reported in 2020 and 2021) that did not meet the mandatory threshold following its assessment. The figures suggest many incidents are reported as NIS incidents when they are not, but it&#39;s possible there were some actual NIS incidents that were not reported as the final total of 19 seems quite low...:&lt;ul&gt;&lt;li&gt;2020 - 2 (really 1, see above, but in fact the ICO did not consider it a NIS incident, so 0)&lt;/li&gt;&lt;li&gt;2021 - 3 (really 2, but the ICO did not consider 1 a NIS incident, so 1)&lt;/li&gt;&lt;li&gt;2022 - 4 (really 2, as the ICO did not consider 2 of those a NIS incident)&lt;/li&gt;&lt;li&gt;2023 - 19 (really 18, as one was incorrectly reported to the ICO as well as to the correct competent authority, but several were not considered NIS incidents, so 8)&amp;nbsp;&lt;/li&gt;&lt;li&gt;2024 YTD - 9 (but 5 were not considered NIS incidents, so 4)&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;14 Nov 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Product safety, IoT&lt;/b&gt;:&amp;nbsp;in the &lt;a href=&quot;https://assets.publishing.service.gov.uk/media/6736224354652d03d51611a8/opss-horizon-scan-1.pdf&quot;&gt;first horizon scan report&lt;/a&gt;&amp;nbsp;&lt;span style=&quot;background-color: white;&quot;&gt;by the UK Office for Product Safety &amp;amp; Standards (OPSS), privacy, data loss and wider cyber security issues like distributed denial of service (DDOS) attacks were considered as part of harms or benefits a technology may present in relation to non-physical aspects, and the scan&#39;s taxonomy of technologies included cybersecurity and data platforms: &quot;combination of data, policies, processes, and technologies employed to secure information, protect organisations, and protect individuals&#39; cyber assets, including specific biological research through omics, and financial activities through blockchain, like new data technology and PETs. Health data was at greater risk of being compromised by cyber threats. Trends across technologies included security issues, with new vulnerabilities created by increased automation and connected technology with IoT, and new ways of compromise; most IoT devices&#39; relatively limited computing power limits cybersecurity complexity and effectiveness, their interconnectivity increases vulnerabilities (specific IoT rapid review guidance). Social commerce normalises online money transfer enabling cybersecurity scams. &quot;Blockchain can potentially offer some solutions to these challenges&quot;. Online marketplaces also need consumer protection against scams.&lt;ul&gt;&lt;li&gt;OPSS research on consumer attitudes/awareness indicated consumers are increasingly comfortable with manufacturers making changes remotely in the case of physical safety issues or cyber security vulnerabilities, but becoming less considerate of cyber security before initial purchase, particularly those with a low education level. Note that the OPSS is responsible for enforcing the UK&#39;s &lt;a href=&quot;https://www.legislation.gov.uk/ukpga/2022/46&quot;&gt;Product Security and Telecommunications Infrastructure Act (PSTI)&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;12 Nov 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Financial services, vendors:&lt;/b&gt;&amp;nbsp;UK FS regulators&amp;nbsp;Bank of England (Bank), Prudential Regulation Authority (PRA) and the Financial Conduct Authority (FCA)&amp;nbsp;&lt;a href=&quot;https://www.bankofengland.co.uk/prudential-regulation/publication/2024/november/operational-resilience-critical-third-parties-to-the-uk-financial-sector-policy-statement&quot;&gt;issued&lt;/a&gt;&amp;nbsp;PS16/24 FCA 24/16 – Operational resilience: Critical third parties to the UK financial sector, with final rules for FS use of &lt;i&gt;critical third parties (CTPs)&lt;/i&gt; including &lt;i&gt;operational risk and resilience requirements&lt;/i&gt;, and &lt;i&gt;incident reporting and other notifications&lt;/i&gt;&amp;nbsp;and &lt;i&gt;enforcement&lt;/i&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Security engineering, learning&lt;/b&gt;: all PDF chapters of the late, great Ross Anderson&#39;s seminal, very readable Security Engineering book (3rd edition 2020) are &lt;a href=&quot;https://www.lightbluetouchpaper.org/2024/11/12/sev3-download/&quot;&gt;now&lt;/a&gt;&amp;nbsp;available for free download via &lt;a href=&quot;https://www.cl.cam.ac.uk/archive/rja14/book.html&quot;&gt;this link&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;7 Nov 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;NIS2, risk management&lt;/b&gt;: EU security agency ENISA &lt;a href=&quot;https://www.enisa.europa.eu/news/asking-for-your-feedback-enisa-technical-guidance-for-the-cybersecurity-measures-of-the-nis2-implementing-act&quot;&gt;issued&lt;/a&gt; a consultation on its detailed technical implementin gguidance (PDF no longer availabe on ENISA&#39;s website, but &lt;a href=&quot;http://web.archive.org/web/20241204082142/https://www.enisa.europa.eu/sites/default/files/2024-11/Implementation%20guidance%20on%20security%20measures_FOR%20PUBLIC%20CONSULTATION.pdf&quot;&gt;see Internet Archive&lt;/a&gt;)&amp;nbsp;to support EU Member States and entities with&amp;nbsp; implementation of the technical and methodological requirements of NIS2&#39;s required cybersecurity risk management measures. The final version is awaited. (On the implementing regulation for certain types of entities, see &lt;a href=&quot;https://blog.kuan0.com/2024/10/data-protection-cyber-security-oct-2024.html&quot;&gt;my October post&lt;/a&gt;.)&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;4 Nov 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;QR code phishing&lt;/b&gt;: this is phishing by tricking people into scanning malicious QR codes to take them to malicious websites or install/open malicious apps/files, and it&#39;s an increasing attack vector. Microsoft &lt;a href=&quot;https://www.microsoft.com/en-us/security/blog/2024/11/04/how-microsoft-defender-for-office-365-innovated-to-address-qr-code-phishing-attacks/&quot;&gt;explained&lt;/a&gt; how it updated its Microsoft Defender for Office 365 to address this&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;31 Oct 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Incident response, preparations, resilience:&lt;/b&gt;&amp;nbsp;&lt;a href=&quot;https://www.fca.org.uk/firms/operational-resilience/crowdstrike-outage-lessons-operational-resilience&quot;&gt;helpful lessons&lt;/a&gt;&amp;nbsp;on the Jul 24 Crowdstrike outage from the UK Financial Conduct Authority (FCA) with its observations on how FS firms responded to the incident including &lt;i&gt;infrastructure resilience, third party management, incident response and communications&lt;/i&gt;, with recommendations on what firms should be doing on these fronts&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Cybersecurity measures&lt;/b&gt;: ending Cybersecurity Awareness Month, Microsoft &lt;a href=&quot;https://www.microsoft.com/en-us/security/blog/2024/10/31/7-cybersecurity-trends-and-tips-for-small-and-medium-businesses-to-stay-protected/&quot;&gt;published&lt;/a&gt;&amp;nbsp;7 cybersecruity trends and (same old, same old!) its tips for SMEs:&lt;/li&gt;&lt;ul&gt;&lt;li&gt;1in 3 SMBs have suffered a cyberattack (Microsoft tips: strong passwords, MFA, consider password manager, recognise/report phishing, keep software updated i.e. patching)&lt;/li&gt;&lt;li&gt;Attacks cost them&amp;nbsp;&amp;gt;$250k on average and up to $7m (tip: risk assessment to understand gaps, determine measures to address)&lt;/li&gt;&lt;li&gt;81% of SMBs think AI increases need for additional security controls (tip: data security &amp;amp; data governance when adopting AI)&lt;/li&gt;&lt;li&gt;94% think cybersecurity is business-critical (tip: educate/train employees e.g. using &lt;a href=&quot;https://www.microsoft.com/security/business/cybersecurity-awareness&quot;&gt;Microsoft awareness resources&lt;/a&gt;)&lt;/li&gt;&lt;li&gt;&amp;lt;30% manage security in-house (tip: it&#39;s common to engage a Managed Service Provider (MSP) for security support)&lt;/li&gt;&lt;li&gt;80% mean to increase cybersecurity spending, prioritising &quot;data protection&quot; [NB &lt;i&gt;broader &lt;/i&gt;than in the GDPR sense] (tip: prioritise data protection, firewall, anti-phishing, ransomware &amp;amp; device/endpoint protection, access control, identity management e.g. via DLP, EDR, IAM)&lt;/li&gt;&lt;li&gt;68% feel secure data access is a challenge for remote workers (tip: measures to protect data and Internet-connected devices, app store downloads; no credential sharing by email/text only phone in real time)&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;25 Oct 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;People&lt;/b&gt;: article &lt;a href=&quot;https://dl.acm.org/doi/pdf/10.1145/3665665&quot;&gt;Human-Centered Cybersecurity Revisited: From Enemies to Partners&lt;/a&gt;: &quot;Focusing on “enabling approaches” that treat humans as partners adds another layer of protection to our cybersecurity defenses&quot;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Recall the well known 1999 paper, &lt;a href=&quot;https://dl.acm.org/doi/pdf/10.1145/322796.322806&quot;&gt;&quot;Users are Not the Enemy&quot;&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://discovery.ucl.ac.uk/id/eprint/20247/2/CACM%20FINAL.pdf&quot;&gt;cleaner link&lt;/a&gt;). How organisations consider and treat their staff and customers can help improve cybersecurity - or the opposite!&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;24 Oct 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Web security, standards&lt;/b&gt;: a Princeton &lt;a href=&quot;https://www.princeton.edu/news/2024/10/24/internet-researchers-reach-beyond-academia-close-major-security-loophole&quot;&gt;news item&lt;/a&gt;&amp;nbsp;discusses a new security standard their researchers worked on. &quot;The change centers on how web browsers and operating systems verify a website’s identity when establishing a secure connection. They rely on third party organizations known as certification authorities, who issue digital certificates of authenticity based on a website owner’s ability to demonstrate legitimate control over the website domain, usually by embedding a random value that the certification authority has provided. ...bad actors could easily sidestep those hurdles to obtain a fraudulent certificate for a website they do &lt;i&gt;not &lt;/i&gt;legitimately control... it could target any website on the internet. Users had no way to spot the fraud since the certificates were real, even if their underlying facts had been forged. With a fraudulent certificate, criminals could attack users and route traffic to fake sites without anyone knowing... the fake site would look every bit as legitimate as the real one... By adopting the Princeton standard, certification authorities have agreed to verify each website from multiple vantage points rather than only one... [&lt;a href=&quot;https://letsencrypt.org/2020/02/19/multi-perspective-validation/&quot;&gt;multi-perspective validation&lt;/a&gt;]&quot;, which will improve Internet/web security&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;23 Oct 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Cybersecurity measures, certifications, supply chain&lt;/b&gt;: the UK&#39;s Cyber Essentials certification scheme, to encourage organisations to implement key essential cybersecurity measures (cyber hygiene), reached its 10 year anniversary.&lt;/li&gt;&lt;ul&gt;&lt;li&gt;It&#39;s great to &lt;a href=&quot;https://www.gov.uk/government/speeches/cyber-essentials-10-years-on&quot;&gt;hear&lt;/a&gt; it has been effective in improving cybersecurity: &quot;Recent insurance data shows us that organisations with Cyber Essentials are &lt;i&gt;92% less likely&lt;/i&gt; to make a claim on their insurance than those without it&quot;. The NCSC &lt;a href=&quot;https://www.ncsc.gov.uk/blog-post/cyber-essentials-decade&quot;&gt;noted&lt;/a&gt;, &quot;This statistic underscores the scheme’s effectiveness in mitigating cyber risks&quot;. &quot;Additionally, where organisations require their third parties to get Cyber Essentials, we know they&amp;nbsp;&lt;i&gt;experience fewer third party cyber incidents&lt;/i&gt;&quot;.&lt;/li&gt;&lt;li&gt;The &lt;a href=&quot;https://www.gov.uk/government/publications/cyber-essentials-scheme-impact-evaluation&quot;&gt;full impact evaluation&lt;/a&gt;&amp;nbsp;noted that Cyber Essentials:&lt;/li&gt;&lt;ul&gt;&lt;li&gt;is providing cyber security protection to organisations of all sizes, including larger organisations that use other schemes, standards and accreditations&lt;/li&gt;&lt;li&gt;helps to improve organisations’ awareness and understanding of the cyber security risk environment&lt;/li&gt;&lt;li&gt;has stimulated wider actions, good practice and behaviours among organisations that use it&lt;/li&gt;&lt;li&gt;is being actively used as part of &lt;i&gt;supply chain assurance&lt;/i&gt; to inform the supplier selection process, instil confidence and demonstrate basic cyber hygiene to the market&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;The NCSC also added, &quot;Cyber Essentials has played a crucial role in &lt;i&gt;raising awareness&lt;/i&gt; about cyber security. An evaluation conducted as part of the 10-year review revealed that &lt;i&gt;85% of certified organisations reported a better understanding of cyber risks&lt;/i&gt;. This increased awareness has empowered businesses to take proactive measures in safeguarding their digital assets&quot;, and &lt;a href=&quot;https://www.ncsc.gov.uk/news/cyber-essentials-scheme-marks-a-decade-of-boosting-businesses-cyber-defences&quot;&gt;said&lt;/a&gt;&amp;nbsp;&quot;The data is clear, &lt;i&gt;implementing the five controls significantly lowers the risk of experiencing a cyber incident&lt;/i&gt;. For organisations lacking the necessary in-house expertise, support is readily available through companies offering the NCSC-recognised Cyber Advisor Service&quot;&lt;/li&gt;&lt;li&gt;Also, to &lt;span style=&quot;font-style: normal;&quot;&gt;improve&amp;nbsp;&lt;/span&gt;&lt;i&gt;supply chain security&lt;/i&gt;,&amp;nbsp;&lt;i&gt;procurement efficiency, consistent minimum standards&lt;/i&gt;, UK financial entities Barclays, Lloyds Banking Group, Nationwide, NatWest, Santander UK and TSB have &lt;a href=&quot;https://www.gov.uk/government/publications/cyber-essentials-supply-chain-commitment-joint-statement/cyber-essentials-supply-chain-commitment-joint-statement&quot;&gt;stated&lt;/a&gt;&amp;nbsp;that they will promote and incorporate Cyber Essentials in their supply chain risk management and they encourage other businesses to incorporate Cyber Essentials into their supplier requirements. (This would also &quot;Spread greater cyber insurance coverage across supply chains through the provision of &lt;i&gt;free cyber insurance, and incident response services&lt;/i&gt;, included with Cyber Essentials certification to qualifying organisations&quot;)&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Comment: Contractually requiring suppliers/vendors/service providers to be certified is a helpful move in the right direction. Cyber Essentials measures are the bare minimum that organisations should take, are not difficult to implement, and would go a long way towards preventing or reducing the impact of cyber incidents, so all organisations should be certifying, or at least implementing those measures even if they don&#39;t get certified! Unlike with ISO standards, &lt;a href=&quot;https://www.ncsc.gov.uk/cyberessentials/overview&quot;&gt;Cyber Essentials&lt;/a&gt; measures &lt;a href=&quot;https://iasme.co.uk/cyber-essentials/&quot;&gt;are&lt;/a&gt; freely available, whether &lt;a href=&quot;https://iasme.co.uk/cyber-essentials/&quot;&gt;implemented&lt;/a&gt; through self-assessment or (Plus) third-party audit.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Note:&amp;nbsp;&lt;a href=&quot;https://iasme.co.uk/cyber-essentials/funded-programme/&quot;&gt;Cyber Essentials funding&lt;/a&gt;&amp;nbsp;is offered to small organisations in certain sectors like AI, quantum, semiconductors etc., with certain criteria&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;2 Oct 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Ransomware: &lt;/b&gt;&lt;a href=&quot;https://www.gov.uk/government/publications/cri-guidance-for-organisations-during-ransomware-incidents/cri-guidance-for-organisations-during-ransomware-incidents&quot;&gt;Counter Ransomware Initiative (CRI) guidance&lt;/a&gt; for organisations experiencing a ransomware attack and organisations supporting them&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;b&gt;Scanning, testing&lt;/b&gt;: &lt;/span&gt;interesting &lt;a href=&quot;https://www.bitsight.com/sites/default/files/2024-10/Gallagher%20Re_Scanning%20the%20Horizon-How%20broadening%20our%20use%20of%20cybersecurity%20data%20can%20help%20insurers.pdf&quot;&gt;study&lt;/a&gt; on how external cybersecurity scanning data can enhance underwriting accuracy for the &lt;i&gt;(re)insurance industry&lt;/i&gt;. This compared companies’ security controls with actual insurance claims, identifying key predictive factors including the organisation&#39;s &lt;i&gt;IP address count&lt;/i&gt; and &lt;i&gt;patching cadence&lt;/i&gt; (the speed at which it updated software to address vulnerabilities), that help forecast claims. Single Point of Failure (SPoF) data also highlighted &lt;i&gt;dependencies on third-party services&lt;/i&gt; like AWS (cloud) and VPNs&lt;/li&gt;&lt;ul&gt;&lt;li&gt;While aimed at (re)insurance, scanning/pen testing obviously is also helpful if not essential for insured organisations, and same issues obviously affect&amp;nbsp;their&amp;nbsp;susceptibility to successful attacks, so keep your number of IP addresses limited to reduce exposure, and (not a new recommendation) patch ASAP!&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;25 Sept but UK&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/government/news/g7-cyber-expert-group-recommends-action-to-combat-financial-sector-risks-from-quantum-computing&quot;&gt;press release&lt;/a&gt;&amp;nbsp;17 Oct 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Quantum computing, encryption, financial services&lt;/b&gt;&amp;nbsp;- risks to security &amp;amp; FS:&amp;nbsp;&lt;a href=&quot;https://assets.publishing.service.gov.uk/media/672e3a8d5437e298ae64cef8/G7-CYBER-EXPERT-GROUP-STATEMENT-PLANNING-OPPORTUNITIES-RISKS-QUANTUM-COMPUTING.pdf&quot;&gt;G7 Cyber Expert Group&#39;s statement&lt;/a&gt;&amp;nbsp;on planning for&amp;nbsp;&lt;b&gt;quantum computing&#39;s opportunities and risks&amp;nbsp;&lt;/b&gt;(including to &lt;i&gt;public key cryptography&lt;/i&gt;) and steps that&amp;nbsp;&lt;b&gt;financial entities&lt;/b&gt;&amp;nbsp;should take&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;10 Sept 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Cybercrime, data sharing&lt;/b&gt;: the UK ICO and National Crime Agency (NCA)&amp;nbsp;&lt;a href=&quot;https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/09/ico-and-nca-sign-memorandum-of-understanding-for-further-collaboration-on-cyber-security/&quot;&gt;signed&lt;/a&gt; a &lt;a href=&quot;https://ico.org.uk/media/about-the-ico/mou/4030961/ico_nca_mou.pdf&quot;&gt;memo of understanding&lt;/a&gt;&amp;nbsp;on how they&#39;ll collaborate to improve the UK&#39;s cyber resilience, including &quot;The NCA will never pass information shared with it in confidence by an organisation to us without having first sought the consent of that organisation&quot; and &quot;We will support the NCA’s visibility of UK cyber attacks by sharing information about cyber incidents with the NCA on an anonymised, systemic and aggregated basis, and on an organisation specific basis where appropriate, to assist the NCA in protecting the public from serious and organised crime&quot;&lt;/li&gt;
&lt;/ul&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/3227582388220749430'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/3227582388220749430'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2025/01/things-cyber-security-q4-2024.html' title='Things cyber security, Q4 2024'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-4126456959904483371</id><published>2025-01-10T17:14:00.016+00:00</published><updated>2025-01-13T13:34:28.026+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AI"/><category scheme="http://www.blogger.com/atom/ns#" term="artificial intelligence"/><category scheme="http://www.blogger.com/atom/ns#" term="data protection"/><category scheme="http://www.blogger.com/atom/ns#" term="eu"/><category scheme="http://www.blogger.com/atom/ns#" term="LLMs"/><category scheme="http://www.blogger.com/atom/ns#" term="machine learning"/><category scheme="http://www.blogger.com/atom/ns#" term="ML"/><category scheme="http://www.blogger.com/atom/ns#" term="uk"/><title type='text'>Things AI, Q4 2024</title><content type='html'>&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;Selected things AI, mostly from Q4 2024, are listed below in reverse chronological order, some with descriptions. See also&amp;nbsp;&lt;a href=&quot;https://blog.kuan0.com/2024/10/things-ai-oct-2024.html&quot;&gt;Things AI, Oct 2024&lt;/a&gt;, &lt;a href=&quot;https://blog.kuan0.com/2025/01/proposed-eu-ai-liability-directive.html&quot;&gt;AI Liability Directive links&lt;/a&gt;, and&amp;nbsp;&lt;a href=&quot;https://blog.kuan0.com/2024/10/data-protection-cyber-security-oct-2024.html&quot;&gt;Data protection &amp;amp; cyber security, Oct 2024&lt;/a&gt;.&amp;nbsp;This blog illustrates how much is going on and the fast pace of AI-related developments, and I repeat that I&#39;ve curated the below and by no means included all or even most of what&#39;s been happening. Italy&#39;s Garante seems the most active supervisory authority in enforcing against AI-related matters under GDPR. (Note that * is used in possible &quot;rude words&quot; to prevent this blog being auto-blocked, e.g. by AI!)&amp;nbsp;&lt;/p&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;30 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Tools, open source&lt;/b&gt;: chipmaker NVIDIA&amp;nbsp;&lt;a href=&quot;https://www.run.ai/blog/run-ai-joins-nvidia&quot;&gt;acquired &lt;/a&gt;run:ai, and plans to open source its software, that helps customers/users &quot;to orchestrate their AI Infrastructure, increase efficiency and utilization, and boost the productivity of their AI teams&quot;, so that it can be used even with &lt;i&gt;non&lt;/i&gt;-NVIDIA GPUs, whether on-prem or in-cloud&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;23 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Future&lt;/b&gt;: Stanford University&#39;s Human-Centered Artificial Intelligence (HAI)&amp;nbsp;center &lt;a href=&quot;https://hai.stanford.edu/news/predictions-ai-2025-collaborative-agents-ai-skepticism-and-new-risks&quot;&gt;issued&lt;/a&gt; its&amp;nbsp;Predictions for AI in 2025: Collaborative Agents, AI Skepticism, and New Risks&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;20 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Data protection, enforcement, training, Italy&lt;/b&gt;: following its investigation into OpenAI&#39;s ChatGPT (&lt;a href=&quot;https://www.garanteprivacy.it/web/guest/home/docweb/-/docweb-display/docweb/10085432#english&quot;&gt;news item&lt;/a&gt;), Italy&#39;s Garante fined OpenAI €15m (this amount was said to take account of its cooperative attitude, suggesting it could have been much higher!) and ordered OpenAI to conduct a &quot;6-month institutional communication campaign on radio, television, newspapers and the Internet. The content, to be agreed with the Authority, should promote public understanding and awareness of the functioning of ChatGPT, in particular on the &lt;i&gt;collection of user and non-user data for the training&lt;/i&gt; of generative artificial intelligence and the &lt;i&gt;rights exercised by data subjects&lt;/i&gt;, including the rights to object, rectify and delete their data. Through this communication campaign, users and non-users of ChatGPT will have to be made aware of how to oppose generative artificial intelligence being trained with their personal data and thus be effectively enabled to exercise their rights under the GDPR... in view of the fact that the company established its European headquarters in Ireland in the course of the preliminary investigation, the Data Protection Authority, in compliance with the so-called one stop shop mechanism, forwarded the procedural documents to the Irish Data Protection Authority (DPC), which became lead supervisory authority under the GDPR so as to continue investigating any ongoing infringements that have not been exhausted before the opening of the European headquarters&quot;&lt;/li&gt;&lt;li&gt;&lt;b&gt;AGI, reasoning&lt;/b&gt;: OpenAI&#39;s new o3 model&amp;nbsp;&lt;a href=&quot;https://arcprize.org/blog/oai-o3-pub-breakthrough&quot;&gt;scored&lt;/a&gt; a breakthrough high score for its performance in one Arc Prize challenge, although still not reaching AGI...&amp;nbsp;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Risks, testing&lt;/b&gt;: the US NIST &lt;a href=&quot;https://ai-challenges.nist.gov/aria/docs/ARIA_Program_Companion_Document_Dec20.pdf&quot;&gt;published&lt;/a&gt;&amp;nbsp;a paper,&amp;nbsp;The Assessing Risks and Impacts of AI (ARIA)
Program Evaluation Design Document. &quot;ARIA (Assessing Risks and Impacts of AI) is a NIST evaluation-driven research program to develop measurement methods that can account for AI’s risks and impacts in the real world. The program establishes an experimentation environment to gather evidence about what happens when people use AI under controlled real-world conditions&quot;. Its testbed involves model testing, red teaming and field testing. &quot;Dialogues collected in the ARIA environment will be curated and anonymized and are planned to be publicly released after each evaluation series. The publication of ARIA’s methods, metrics, practices and tools will facilitate adoption and scaling across industry and research settings&quot;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Testing, researchers&lt;/b&gt;: OpenAI&amp;nbsp;&lt;a href=&quot;https://openai.com/policies/early-access-terms/&quot;&gt;invited&lt;/a&gt;&amp;nbsp;safety researchers&amp;nbsp;to apply to receive API access to its forthcoming frontier models, including o3-mini, to advance frontier safety&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;19 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Agents&lt;/b&gt;: Anthropic has shared its&amp;nbsp;&lt;a href=&quot;https://www.anthropic.com/research/building-effective-agents&quot;&gt;learnings&lt;/a&gt; on how to build effective AI agents&lt;/li&gt;&lt;li&gt;&lt;b style=&quot;font-weight: bold;&quot;&gt;Agents, genAI&lt;/b&gt;: Microsoft researchers &lt;a href=&quot;https://www.arxiv.org/abs/2412.16241&quot;&gt;submitted&lt;/a&gt; a paper on the current resurgence of agents and argue that &quot;While generative AI is appealing, this technology alone is insufficient to make new generations of agents more successful. To make the current wave of agents effective and sustainable, we envision an ecosystem that includes not only agents but also Sims, which represent &lt;i&gt;user preferences and behaviors&lt;/i&gt;, as well as Assistants, which &lt;i&gt;directly interact with the user&lt;/i&gt; &lt;i&gt;and coordinate the execution&lt;/i&gt; of user tasks with the help of the agents&quot;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Assistants seem to be software that controls agents on behelf of users. Sims, that simulate users, seem to require some kind of user profiling, so data protection again...&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;AI usage, health, tools&lt;/b&gt;: such a beneficial use case, an Indian group has &lt;a href=&quot;https://spectrum.ieee.org/tuberculosis&quot;&gt;developed&lt;/a&gt; AI tools to assist with tuberculosis diagnosis and treatment&amp;nbsp; &amp;nbsp;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;EU AI Act&lt;/b&gt;: &lt;a href=&quot;https://ec.europa.eu/newsroom/dae/redirection/document/111374&quot;&gt;second draft of GPAI Code of Practice&lt;/a&gt; &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/library/second-draft-general-purpose-ai-code-practice-published-written-independent-experts&quot;&gt;published&lt;/a&gt;, based on feedback on the first draft. This &quot;remains a work in progress. They focused primarily on providing clarifications, adding essential details, and aligning to the principle of proportionality, such as the size of the general-purpose AI model provider.&quot; Verbal discussions on the second draft with Chairs and Vice-Chairs are planned, and workshops with general-purpose AI model providers and Member State representatives in the AI Board Steering Group are planned for the weeks of 20 and 27 January respectively. The third draft of the Code of Practice is expected to be out in the week of 17 February 2025&lt;/li&gt;&lt;ul&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;The Computer &amp;amp; Communications Industry Association (CCIA) &lt;a href=&quot;https://ccianet.org/news/2024/12/eus-gpai-code-rushed-process-about-to-derail-intervention-urgently-needed/&quot;&gt;criticised&lt;/a&gt; the draft as containing &quot;measures already explicitly rejected by EU co-legislators during the AI Act negotiations. Ideas previously dismissed that have been resurrected include mandatory third-party assessment and differentiated treatment between smaller and larger GPAI developers. If left unchecked, the Code risks becoming an undemocratic vehicle that overturns the AI Act’s legislative process. This second iteration also contains measures going far beyond the Act’s agreed scope, such as far-reaching copyright measures&quot;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;18 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b style=&quot;font-weight: bold;&quot;&gt;Environment, tools&lt;/b&gt;: Microsoft &lt;a href=&quot;https://blogs.microsoft.com/on-the-issues/2024/12/18/announcing-sparrow-a-breakthrough-ai-tool-to-measure-and-protect-earths-biodiversity-in-the-most-remote-places/&quot;&gt;announced&lt;/a&gt; &quot;SPARROW: A Breakthrough AI Tool to Measure and Protect Earth’s Biodiversity in the Most Remote Places&quot;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;&lt;b&gt;Intellectual property, laws&lt;/b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;:&amp;nbsp;in the UK Parliament&#39;s &lt;a href=&quot;https://hansard.parliament.uk/lords/2024-12-18/debates/A1CA5CDE-6F55-42E6-8153-31F3FFB302E4/Data(UseAndAccess)Bill(HL)&quot;&gt;debate&lt;/a&gt; on the Data (Use and Access) Bill, various amendments were &lt;a href=&quot;https://bills.parliament.uk/Publications/57358/Documents/5489&quot;&gt;proposed&lt;/a&gt; on AI and copyright, and more..., we&#39;ll have to wait to find out which ones if any get through (and see 17 Dec)&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Models, testing&lt;/b&gt;: from the UK Artificial Intelligence Safety Institute (AISI) and US Artificial Intelligence Safety Institute, a &lt;a href=&quot;https://www.aisi.gov.uk/work/pre-deployment-evaluation-of-openais-o1-model&quot;&gt;joint pre-deployment evaluation&lt;/a&gt; of OpenAI&#39;s o1 model (see 5 Dec)&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Neurosymbolic AI, LLM hallucinations&lt;/b&gt;: good article &lt;a href=&quot;https://fortune.com/2024/12/09/neurosymbolic-ai-deep-learning-symbolic-reasoning-reliability/&quot;&gt;Generative AI can’t shake its reliability problem. Some say ‘neurosymbolic AI’ is the answer&lt;/a&gt;, on &quot;neurosymbolic AI, which its advocates say blends the strengths of today’s LLMs with the explainability and reliability of this older, symbolic approach&quot;&lt;/li&gt;&lt;ul&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;An example of a neurosymbolic system is Google&#39;s impressive &lt;a href=&quot;https://deepmind.google/discover/blog/alphageometry-an-olympiad-level-ai-system-for-geometry/&quot;&gt;AlphaGeometry&lt;/a&gt; AI system (&lt;a href=&quot;https://github.com/google-deepmind/alphageometry&quot;&gt;certain code)&lt;/a&gt;, that &quot;surpasses the state-of-the-art approach for geometry problems, advancing AI reasoning in mathematics...&amp;nbsp;solves complex geometry problems at a level approaching a human Olympiad gold-medalist - a breakthrough in AI performance...&quot;. &quot;AlphaGeometry is a neuro-symbolic system made up of a &lt;i&gt;neural language model&lt;/i&gt; and a &lt;i&gt;symbolic deduction engine&lt;/i&gt;, which work together to find proofs for complex geometry theorems. Akin to the idea of “thinking, fast and slow”, one system provides fast, “intuitive” ideas, and the other, more deliberate, rational decision-making. Because language models excel at identifying general patterns and relationships in data, they can quickly predict potentially useful constructs, but often lack the ability to reason rigorously or explain their decisions. Symbolic deduction engines, on the other hand, are based on formal logic and use clear rules to arrive at conclusions. They are rational and explainable, but they can be “slow” and inflexible - especially when dealing with large, complex problems on their own. AlphaGeometry’s language model guides its symbolic deduction engine towards likely solutions to geometry problems...&quot;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;As the Turing Institute &lt;a href=&quot;https://www.turing.ac.uk/research/interest-groups/neuro-symbolic-ai&quot;&gt;puts it&lt;/a&gt;, &quot;“sub-symbolic” or “neuro-inspired” techniques only work well for certain classes of problem and are generally opaque to both analysis and understanding... “symbolic” AI techniques, based on rules, logic and reasoning, while not as efficient as “sub-symbolic” approaches, have much better behaviour in terms of transparency, explainability, verifiability and, indeed, trustworthiness... “neuro-symbolic” AI has been suggested, combining the efficiency of “sub-symbolic” AI with the transparency of “symbolic” AI. This combination can potentially provide a new wave of AI tools and systems that are both interpretable and elaboration tolerant and can integrate reasoning and learning in a very general way&quot;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;Also see 2023 paper&amp;nbsp;&lt;a href=&quot;https://arxiv.org/abs/2305.00813&quot;&gt;Neurosymbolic AI -- Why, What, and How&lt;/a&gt;, May 2024 article&amp;nbsp;&lt;a href=&quot;https://www.forbes.com/sites/joshuadupuy/2024/05/15/neuro-symbolic-ai-could-redefine-legal-practices/&quot;&gt;Neuro-Symbolic AI Could Redefine Legal Practices&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Future&lt;/b&gt;: &lt;a href=&quot;https://www.aisnakeoil.com/p/is-ai-progress-slowing-down&quot;&gt;is AI progress slowing down&lt;/a&gt;?&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;17 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;GenAI, contract, usage&lt;/b&gt;: Google &lt;a href=&quot;https://blog.google/feed/were-updating-our-generative-ai-prohibited-use-policy/&quot;&gt;updated&lt;/a&gt; its generative AI prohibited use policy to add &quot;clear &lt;i&gt;examples&lt;/i&gt; of conduct that is not acceptable. For example, we’re explicitly stating that using our tools to create or distribute non-consensual intimate imagery or to compromise security by facilitating phishing or malware is not allowed under the policy. Finally, we&#39;ve added language that allows for &lt;i&gt;exceptions&lt;/i&gt; for certain educational, artistic, journalistic or academic use cases that might otherwise violate our policies&quot;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Data protection&lt;/b&gt; (and see next point): the EDPB &lt;a href=&quot;https://www.edpb.europa.eu/system/files/2024-12/edpb_opinion_202428_ai-models_en.pdf&quot;&gt;adopted&lt;/a&gt; its Opinion 28/2024 on certain data protection aspects related to the processing of personal data in the context of AI models (see my &lt;a href=&quot;https://blog.kuan0.com/2024/11/ai-legitimate-interests.html&quot;&gt;blog&lt;/a&gt; on its stakeholder workshop, legitimate interests, and other important data protection issues)&lt;/li&gt;&lt;ul&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;This consistency opinion was requested by the Irish DPC, who &lt;a href=&quot;https://dataprotection.ie/en/irish-data-protection-commission-welcomes-edpb-opinion-use-personal-data-development-and-deployment&quot;&gt;welcomed&lt;/a&gt; it&lt;/li&gt;&lt;/ul&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Intellectual property, laws&lt;/b&gt;: the UK &lt;a href=&quot;https://www.gov.uk/government/consultations/copyright-and-artificial-intelligence/copyright-and-artificial-intelligence#c-our-proposed-approach&quot;&gt;opened&lt;/a&gt;&amp;nbsp;a public consultation on copyright and AI (&lt;a href=&quot;https://www.gov.uk/government/news/uk-consults-on-proposals-to-give-creative-industries-and-ai-developers-clarity-over-copyright-laws&quot;&gt;news&lt;/a&gt;, deadline 25 Feb 25), seeking views on how to achieve its objectives for the AI &lt;i&gt;and&lt;/i&gt; creative sectors of&amp;nbsp; 1. Supporting right holders’ control of their content and ability to be remunerated for its use; 2. Supporting the development of world-leading AI models in the UK by ensuring wide and lawful access to high-quality data; 3. Promoting greater trust and transparency between the sectors (see also 18 Dec). It is considering:&lt;/li&gt;&lt;ul&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;Measures that would require &lt;i&gt;increased transparency&lt;/i&gt; from AI developers. &quot;This includes the content they use to train their models, how they acquire it, and any content generated by their models&quot; (training data information including provenance, etc.), and&lt;/li&gt;&lt;li style=&quot;margin-bottom: -0.2em; margin-top: -0.2em; padding: 0px;&quot;&gt;Introduction of an &lt;i&gt;exception to copyright law for “text and data mining”&lt;/i&gt;, to improve access to content by AI developers but allow right holders to reserve their rights and thereby prevent their content being used for AI training -&amp;nbsp;similar to the EU’s exception for text and data mining&quot;,under &lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32019L0790#art_4&quot;&gt;Art.4&lt;/a&gt;, Digital Single Market Copyright Directive (Directive (EU) 2019/790), but with rights reservations &quot;using effective and accessible machine-readable formats&quot; like robots.txt or metadata&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;span style=&quot;border: none; margin-top: -0.2em; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;Some thoughts/queries&amp;nbsp;here on &lt;b&gt;data protection&lt;/b&gt;:&amp;nbsp;&lt;/span&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;The consultation document does&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://www.gov.uk/government/consultations/copyright-and-artificial-intelligence&quot; style=&quot;font-weight: 400;&quot;&gt;mention&lt;/a&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&amp;nbsp;data protection where personal data is used to train AI models or appears in AI-generated outputs (174), &amp;amp; that the ICO will issue further guidance on genAI (179)&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li&gt;It notes &lt;i&gt;existing&lt;/i&gt; protection for personality: the passing off tort against misrepresentation in a commercial environment; some IP rights like copyright may help people control/prevent digital replicas, eg sound recording rights if training on a singer’s recorded voice, performance rights of film actors, singers.&lt;/li&gt;&lt;li&gt;The UK isn&#39;t seeking but would &quot;welcome views&quot; on intellectual property protection for personality rights (178).&lt;/li&gt;&lt;li&gt;Problem: IP rights, like the US right of publicity personality right, protect &lt;i&gt;commercial proprietary&lt;/i&gt; interests, NOT human rights, and are often signed away to music/film companies. US rights of publicity/personality vary with the state, and generally protect only &lt;i&gt;celebrities &lt;/i&gt;who can commercially exploit their well-known images, etc.&lt;/li&gt;&lt;li&gt;So, for ordinary UK/EU people, is GDPR adequate? Yes, using photo/video/audio to create a replica of someone&#39;s likeness &lt;i&gt;is&lt;/i&gt; processing their personaldata, but &lt;i&gt;could it be made clearer (e.g. by supervisory authorities) that &lt;b&gt;deploying&lt;/b&gt;&amp;nbsp;those replicas,&amp;nbsp;&lt;/i&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;e.g. in ads, scams etc,&amp;nbsp;&lt;/span&gt;&lt;i&gt;also &lt;/i&gt;constitutes &quot;processing&quot; of personal data, particularly if deepfakes are used in ways the person wouldn&#39;t agree to?&lt;/li&gt;&lt;li&gt;As regards GDPR remedies, shouldn&#39;t people have a &lt;i&gt;right to prevent&lt;/i&gt; their deepfaked voice, image etc being used without their knowledge or consent, &lt;i&gt;even if&lt;/i&gt; they&#39;re not famous? If legitimate interests is the claimed legal basis for using their likeness/voice, there&#39;s certainly a right to object, and compensation claims may be possible, but should there be additional&amp;nbsp;&lt;i&gt;&lt;b&gt;positive rights&lt;/b&gt; &lt;/i&gt;there, e.g. to require hosting providers to &lt;i&gt;take down&lt;/i&gt; deepfakes?&lt;/li&gt;&lt;li&gt;Real examples of deepfake misuse (there are many more): &lt;a href=&quot;https://www.theguardian.com/technology/2024/apr/28/bbc-presenters-likeness-used-in-advert-after-firm-tricked-by-ai-generated-voice&quot;&gt;BBC presenter&lt;/a&gt;; &lt;a href=&quot;https://www.dailydot.com/news/womans-likeness-stolen-by-ai-deepfake/&quot;&gt;social media user&lt;/a&gt;. Not to mention faces (almost invariably female) being used in deepfaked nudes, porn etc (Note: on 7 Jan, the UK government &lt;a href=&quot;https://www.gov.uk/government/news/government-crackdown-on-explicit-deepfakes&quot;&gt;stated&lt;/a&gt; it would introduce a new offence for&amp;nbsp;creating s**ually explicit deepfake images, plus other offences, as promised in the &lt;a href=&quot;https://labour.org.uk/wp-content/uploads/2024/06/Labour-Party-manifesto-2024.pdf&quot;&gt;Labour Party manifesto&lt;/a&gt;&amp;nbsp;p.35)&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Policy, risks, US:&lt;/b&gt;&amp;nbsp;the US Congress&#39;s&amp;nbsp;bipartisan House Task Force on Artificial Intelligence&amp;nbsp;&lt;a href=&quot;https://republicans-science.house.gov/_cache/files/a/a/aa2ee12f-8f0c-46a3-8ff8-8e4215d6a72b/E4AF21104CB138F3127D8FF7EA71A393.ai-task-force-report-final.pdf&quot;&gt;published&lt;/a&gt;&amp;nbsp;its report on AI (&lt;a href=&quot;https://science.house.gov/2024/12/house-bipartisan-task-force-on-artificial-intelligence-delivers-report&quot;&gt;news item&lt;/a&gt;). This long report covered the full range of AI-related concerns: US government use of AI, federal preemption of state law, data privacy, national security, research, development &amp;amp; standards, civil rights &amp;amp; civil liberties, education &amp;amp; workforce, intellectual property, content authenticity, open and close systems, energy usage and data centers, small business, agriculture, healthcare and financial services&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Transparency, AI usage&lt;/b&gt;: the UK government&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/algorithmic-transparency-records&quot;&gt;published&lt;/a&gt; information (using the UK&#39;s &lt;a href=&quot;https://www.gov.uk/government/publications/algorithmic-transparency-template&quot;&gt;Algorithmic Transparency Recording Standard&lt;/a&gt;&amp;nbsp;(ATRS); &lt;a href=&quot;https://www.gov.uk/government/publications/guidance-for-organisations-using-the-algorithmic-transparency-recording-standard/algorithmic-transparency-recording-standard-guidance-for-public-sector-bodies&quot;&gt;guidance&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://rtau.blog.gov.uk/2024/03/07/algorithmic-transparency-recording-standard-getting-ready-for-adoption-at-scale/&quot;&gt;more on ATRS&lt;/a&gt;) on 14 further UK algorithmic tools used in public sector&amp;nbsp;decision-making (&lt;a href=&quot;https://www.gov.uk/government/news/new-records-detail-how-ai-helps-government-make-quick-accurate-decisions-to-boost-trade-speed-up-responses-and-more?utm_medium=email&amp;amp;utm_campaign=govuk-notifications-topic&amp;amp;utm_source=0095ee16-4b6c-4825-a3d3-4fa4833f663f&amp;amp;utm_content=immediately&quot;&gt;news item&lt;/a&gt;). This may or may not have been in response to news reports about lack of transparency regarding UK government tools, see 28 Nov&lt;/li&gt;&lt;ul&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;The list is worth a skim, there have been many different uses, not limited to chatbots&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;The UK also &lt;a href=&quot;https://www.gov.uk/government/publications/algorithmic-transparency-recording-standard-mandatory-scope-and-exemptions-policy/algorithmic-transparency-recording-standard-atrs-mandatory-scope-and-exemptions-policy&quot;&gt;published&lt;/a&gt; a mandatory scope and exemptions policy for the ATRS, setting out &lt;i&gt;which organisations and algorithmic tools&lt;/i&gt; are in scope of the mandatory requirement&amp;nbsp;to publish ATRS records (i.e. &lt;i&gt;central government&lt;/i&gt; departments and Arm’s-length-bodies (ALBs): executive agencies and non-departmental public bodies which provide public or frontline services or routinely interact with the general public), and &quot;the required steps to ensure that sensitive information is handled appropriately&quot;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;16 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;GenAI, images&lt;/b&gt;: Google&amp;nbsp;&lt;a href=&quot;https://blog.google/technology/google-labs/whisk/&quot;&gt;released&lt;/a&gt; its experimental Whisk, allowing users to prompt using images instead of text to create new images. &quot;Whisk lets you input images for the subject, one for the scene and another image for the style&quot;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;13 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Agents&lt;/b&gt;: Google &lt;a href=&quot;https://cloud.google.com/blog/products/ai-machine-learning/bringing-ai-agents-to-enterprises-with-google-agentspace?utm_source=keywordsnippet&amp;amp;utm_medium=referral&quot;&gt;announced&lt;/a&gt;&amp;nbsp;Google Agentspace for its cloud services, including &quot;agents that bring together Gemini’s advanced reasoning, Google-quality search and enterprise data, regardless of where it’s hosted&quot;&lt;/li&gt;&lt;li&gt;&lt;b&gt;AI risks, taxonomy&lt;/b&gt;: the UK AI Standards Hub discussed&amp;nbsp;&lt;a href=&quot;https://aistandardshub.org/developing-a-taxonomy-of-ai-risks-for-organisations/&quot;&gt;developing a taxonomy of AI risks for organisations&lt;/a&gt;, including a proposed table&amp;nbsp;mapping AI risk sources to AI hazards&amp;nbsp;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Deepfakes, misinformation&lt;/b&gt;: ...&lt;a href=&quot;https://www.aisnakeoil.com/p/we-looked-at-78-election-deepfakes&quot;&gt;Political Misinformation is not an AI Problem&lt;/a&gt;. &quot;Technology Isn’t the Problem—or the Solution... There’s no quick technical fix, or targeted regulation, that can “solve” our information problems. We should reject the simplistic temptation to blame AI for political misinformation and confront the gravity of the hard problem&quot;. As always, it&#39;s humans, not tech - tech can&#39;t solve issues with how humans think and act! (see also 9 Dec)&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Laws&lt;/b&gt;: Lord Clement-Jones&#39;s&amp;nbsp;&lt;a href=&quot;https://bills.parliament.uk/bills/3760/&quot;&gt;Public Authority Algorithmic and Automated Decision-Making Systems Bill&lt;/a&gt; had its second reading (&lt;a href=&quot;https://hansard.parliament.uk/Lords/2024-12-13/debates/AA0C1C17-11FA-410E-A394-846703400F55/PublicAuthorityAlgorithmicAndAutomatedDecision-MakingSystemsBill(HL)&quot;&gt;debate&lt;/a&gt;); the date for its committee stage is TBA&amp;nbsp;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;SLMs, reasoning&lt;/b&gt;: Microsoft &lt;a href=&quot;https://techcommunity.microsoft.com/blog/aiplatformblog/introducing-phi-4-microsoft%E2%80%99s-newest-small-language-model-specializing-in-comple/4357090?utm_source=ai-report.kdnuggets.com&amp;amp;utm_medium=referral&amp;amp;utm_campaign=the-70-problem&quot;&gt;announced&lt;/a&gt; its Phi-4 &quot;Small Language Model Specializing in Complex Reasoning&quot;, that &quot;offers high quality results at a small size (14B parameters)&quot; (and see 4 Dec). SLMs of course are more suitable for on-device processing than LLMs&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;SLMs&lt;/b&gt;: Epoch AI&#39;s article,&amp;nbsp;&lt;a href=&quot;https://epoch.ai/gradient-updates/frontier-language-models-have-become-much-smaller&quot;&gt;Frontier language models have become much smaller&lt;/a&gt;. &quot;...in 2023, the trend of frontier language models becoming bigger reversed... Should we expect frontier models to keep getting smaller? The short answer is probably not, though it’s harder to say if we should expect them to get much bigger than GPT-4 in the near term.&quot;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;12 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;AI usage, LLMs, risks, privacy, PETs&lt;/b&gt;: Anthropic discussed its&amp;nbsp;Claude insights and observations (Clio): &quot;...an automated analysis tool that enables privacy-preserving analysis of real-world language model use. It gives us insights into the day-to-day uses of claude.ai... It’s also already helping us improve our safety measures... Clio takes a different approach, enabling bottom-up discovery of patterns by distilling conversations into abstracted, understandable topic clusters. It does so while preserving user privacy: data are automatically anonymized and aggregated, and only the higher-level clusters are visible to human analysts&quot; (&lt;a href=&quot;https://assets.anthropic.com/m/7e1ab885d1b24176/original/Clio-Privacy-Preserving-Insights-into-Real-World-AI-Use.pdf&quot;&gt;paper&lt;/a&gt;)&lt;/li&gt;&lt;li&gt;&lt;b&gt;EU AI Act, jobs!&lt;/b&gt;: unsurprisingly, the EU AI Office is &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/news/job-opportunities-european-ai-office-legal-and-policy-backgrounds&quot;&gt;recruiting&lt;/a&gt; for legal or policy officers, deadline 15 Jan 25&lt;/li&gt;&lt;li&gt;&lt;b&gt;GenAI, data protection&lt;/b&gt;: while publishing its &lt;a href=&quot;https://ico.org.uk/about-the-ico/what-we-do/our-work-on-artificial-intelligence/response-to-the-consultation-series-on-generative-ai/&quot;&gt;response&lt;/a&gt; to its consultation series on generative AI,the UK ICO &lt;a href=&quot;https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/12/generative-ai-developers-it-s-time-to-tell-people-how-you-re-using-their-information/&quot;&gt;emphasised&lt;/a&gt; that genAI developers must provide proper privacy notices. &quot;...it’s time to tell people how you’re using their information. This could involve providing accessible and specific information that enables people and publishers to understand what personal information has been collected. Without better transparency, it will be hard for people to exercise their information rights and hard for developers to use legitimate interests as their lawful basis&quot;.&lt;/li&gt;&lt;ul&gt;&lt;li&gt;However, unfortunately there&#39;s still little clarity from the ICO on how, if at all, the &lt;a href=&quot;https://www.gdprinfo.info/#a14.4&quot;&gt;Art.14(4)&lt;/a&gt;(b) exemption could apply, where providing the information is &quot;impossible or would involve a disproportionate effort&quot;, even though that was a key point &lt;a href=&quot;https://ico.org.uk/about-the-ico/what-we-do/our-work-on-artificial-intelligence/response-to-the-consultation-series-on-generative-ai/engineering-individual-rights-into-generative-ai-models/#:~:text=argued%20that%20it%20would%20be%20disproportionate&quot;&gt;raised&lt;/a&gt; by some consultation respondents&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;Testing&lt;/b&gt;: the AI Alliance&#39;s&amp;nbsp;&lt;a href=&quot;https://the-ai-alliance.github.io/trust-safety-evals/taxonomy/taxonomy/&quot;&gt;Trust and Safety Evaluations Initiative&lt;/a&gt;, still in draft, was updated to v0.3.1 (initial version was in Oct 24 so quite new), covering: terms glossary, user personae, taxonomy of evaluations &amp;amp; assessments, evaluators and benchmarks, leaderboards and evaluation platform reference stack&amp;nbsp;&lt;/li&gt;&lt;ul&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Data&lt;/b&gt;: the AI Alliance also has an &lt;a href=&quot;https://the-ai-alliance.github.io/open-trusted-data-initiative/&quot;&gt;Open Trusted Data Initiative&lt;/a&gt;&amp;nbsp;(OTDI) with many datasets available; &quot;our mission is to create a comprehensive, widely-sourced catalog of datasets with clear licenses for use, explicit provenance guarantees, and governed transformations, intended for AI model training, tuning, and application patterns like RAG (retrieval augmented generation) and agents&quot;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Skills&lt;/b&gt;: the Alliance has produced a&amp;nbsp;&lt;a href=&quot;https://thealliance.ai/docs/guide-to-essential-competencies-for-ai.pdf&quot;&gt;Guide to Essential Competencies for AI&lt;/a&gt; &quot;to help bridge the AI divide... support a framework for education and training curricula and... help promote inclusive access to AI education. These competencies include the responsible and ethical use of AI, identifying data limitations, data analysis, machine learning, and AI logic, and range in levels from fluency to proficiency to expertise, and finally, mastery&quot;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;11 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Agents&lt;/b&gt;: Google &lt;a href=&quot;https://blog.google/technology/google-deepmind/google-gemini-ai-update-december-2024/&quot;&gt;announced&lt;/a&gt; its Gemini 2.0, its &quot;new AI model for the agentic era&quot;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;AI usage, deepfakes, comms&lt;/b&gt;: Wired article &quot;OnlyFans Models Are Using AI Impersonators to Keep Up With Their DMs&quot;, &quot;AI is replacing the humans who pretend to be OnlyFans stars in online amorous messages&quot;. If there&#39;s tech, people will use it - in all sorts of ways!&lt;/li&gt;&lt;li&gt;&lt;b&gt;AI usage, health&lt;/b&gt;: Meta &lt;a href=&quot;https://about.fb.com/news/2024/12/open-source-ai-is-leading-to-breakthroughs-in-healthcare-education-and-entrepreneurship/&quot;&gt;outlined&lt;/a&gt;&amp;nbsp;use of its open source Llama model by researchers and developers to address various issues, &quot;from gaps in clinical cancer trials to inefficiencies in agriculture&quot;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;OSs, mobile, genAI&lt;/b&gt;: Apple &lt;a href=&quot;https://www.apple.com/newsroom/2024/12/apple-intelligence-now-features-image-playground-genmoji-and-more/&quot;&gt;expanded&lt;/a&gt; its Apple Intelligence AI capabilities for iPhone, iPad, Mac&lt;/li&gt;&lt;ul&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;However, &lt;a href=&quot;https://www.bbc.co.uk/news/articles/cge93de21n0o&quot;&gt;reportedly&lt;/a&gt;&amp;nbsp;this AI has hallucinated inaccurate information when summarising breaking news alerts, and Apple &lt;a href=&quot;https://www.theguardian.com/technology/2025/jan/07/apple-update-ai-inaccurate-news-alerts-bbc-apple-intelligence-iphone?utm_campaign=The%20Week%20in%20Data%20TWID&amp;amp;utm_medium=email&amp;amp;utm_content=341918227&amp;amp;utm_source=hs_email&quot;&gt;stated&lt;/a&gt; it would update the AI feature&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;Sustainability, water, data centers&lt;/b&gt;: &lt;a href=&quot;https://www.techradar.com/pro/microsoft-reveals-new-zero-water-datacenter-cooling-design&quot;&gt;Techradar report&lt;/a&gt;&amp;nbsp;on Microsoft&#39;s new &quot;&lt;a href=&quot;https://www.microsoft.com/en-us/microsoft-cloud/blog/2024/12/09/sustainable-by-design-next-generation-datacenters-consume-zero-water-for-cooling/&quot;&gt;zero-water data center cooling design&lt;/a&gt;&quot;, including reuse of cooling water&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;10 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Adoption, data quality&lt;/b&gt;: &lt;a href=&quot;https://www.ataccama.com/ebook/data-trust-report&quot;&gt;Ataccama Data Trust Report 2025&lt;/a&gt; (registration wall), &lt;a href=&quot;https://www.freevacy.com/news/ataccama/only-33-of-organisations-successfully-implement-ai-company-wide/6007&quot;&gt;reported by Freevacy&lt;/a&gt; as finding, from a survey of 300 US, Canada, and UK data leaders, that &quot;while 74% of responding organisations have adopted some AI-based solutions, only 33% have successfully integrated them across the company&quot;, suggesting that &quot;54% of respondents, with 72% of data strategy decision-makers particularly concerned, feel the pressure of not implementing AI effectively, fearing a potential loss of competitive edge&quot;. 51% of executives prioritised data quality and accuracy improvements, 30% cited challenge of managing large data volumes&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;AI usage, education&lt;/b&gt;: the UK&#39;s Ofsted is &lt;a href=&quot;https://www.gov.uk/government/publications/ofsted-research-on-artificial-intelligence-in-education-terms-of-reference&quot;&gt;researching&lt;/a&gt; how AI is used in education, barriers, challenges and potential benefits&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Clean energy, data centres, sustainability&lt;/b&gt;: Google &lt;a href=&quot;https://blog.google/inside-google/infrastructure/new-approach-to-data-center-and-clean-energy-growth/https://blog.google/inside-google/infrastructure/new-approach-to-data-center-and-clean-energy-growth/&quot;&gt;announced&lt;/a&gt;&amp;nbsp;a strategic partnership with other organisations &quot;to synchronize new clean power generation with data center growth in a novel way&quot;, developing &quot;industrial parks with gigawatts of data center capacity in the U.S., co-located with new clean energy plants to power them&quot;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Employment, recruitment, bias&lt;/b&gt;: IBM &lt;a href=&quot;https://www.ibm.com/think/news/ai-in-recruiting&quot;&gt;on&lt;/a&gt; AI in recruitment, how intersectionality (e.g. female AND non-white) can compound bias in AI-based systems, prioritising data diversity and ongoing monitoring&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;EU&lt;/b&gt;: the&amp;nbsp;European High Performance Computing Joint Undertaking (EuroHPC) &lt;a href=&quot;https://ec.europa.eu/commission/presscorner/detail/en/ip_24_6302&quot;&gt;selected&lt;/a&gt; seven proposals to establish and operate the first &lt;i&gt;AI Factories&lt;/i&gt; across Europe (Finland, Germany, Greece, Italy, Luxembourg, Spain and Sweden), most with &quot;AI-optimised supercomputers&quot;: a major milestone for Europe in building a thriving ecosystem to train advanced AI models and develop AI solutions&quot;, that will &quot;provide access to the massive computing power that start-ups, industry and researchers need to develop their AI models and systems. For example, European large language models or specialised vertical AI models focusing on specific sectors or domains&quot; (&lt;a href=&quot;https://eurohpc-ju.europa.eu/selection-first-seven-ai-factories-drive-europes-leadership-ai-2024-12-10_en&quot;&gt;news release&lt;/a&gt;)&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;9 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;GenAI, video&lt;/b&gt;: OpenAI &lt;a href=&quot;https://openai.com/index/sora-is-here/&quot;&gt;moved&lt;/a&gt; its Sora video generation model out of research preview&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Future, agents&lt;/b&gt;: interesting Quartz article on AI in 2025, tech companies touting AI agents cf returns on investment in AI, &quot;Wall Street isn&#39;t convinced&quot;&amp;nbsp;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;No panacea..., testing&lt;/b&gt;:&amp;nbsp;&lt;a href=&quot;https://wildetruth.substack.com/p/can-ai-break-the-mathematical-law&quot;&gt;Can AI Break the (Mathematical) Law?&lt;/a&gt;&amp;nbsp;&quot;...recent research claims to escape the inescapable — to exit the accuracy-error trade-off with artificial intelligence and machine learning (AI/ML). Are these breakthroughs, or illusions?...&amp;nbsp;The promise of AI/ML is not to use data to escape the structure of the world, but to work more wisely within it. The challenge is knowing when and how to use it — recognizing the implications of universal mathematical laws, aligning with clearly defined policy goals and values, and testing as we go to assess what costs and benefits really accrue to whom&quot;. Again, how humans understand and use AI is critical! (See also 13 Dec)&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Products, data centers, sustainability&lt;/b&gt;: physical products are increasingly AI-enabled. A letter &lt;a href=&quot;https://data.parliament.uk/DepositedPapers/Files/DEP2024-0804/Lord_Leong_to_Lord_Holmes_of_Richmond-PRAM_Bill_AI.pdf&quot;&gt;sent by&lt;/a&gt; Lord Leong, Department for Business &amp;amp; Trade (DBT), on the UK Product Regulation &amp;amp; Metrology Bill, includes: &quot;...The government and regulators will need to consider what specific requirements will be needed on products using Al, to safeguard their safety, as our understanding of their risks increases... the Bill ensures our product safety framework can take into account &lt;i&gt;risks presented by the use of software and Al in physical products&lt;/i&gt;... product regulations made under the Bill will be able to regulate production processes as a whole if required. This will also include any use of Al as part of these processes and the regulations may also set labelling requirements for products containing Al. Regarding use of Al in the creative industries, including challenges to personal data and intellectual property, the Bill does not seek to regulate Al in and of itself. Nor does our product regulation framework cover the creative industries, beyond ensuring any physical product operates safely [refs to planned consultation on copyright &amp;amp; AI, see 17 &amp;amp; 18 Dec] ...Issues of Al and metrology were also raised, specifically on measurement of the &lt;i&gt;power and water use of Al processes or data centres&lt;/i&gt;. The new powers set out in the Bill will allow metrology regulations to be updated to allow us to respond to technological advances, such as in Al... [and to ensure such measurements are accurate]&quot;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;6 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Bias (age, disability, nationality, marital status)&lt;/b&gt;: a tool to detect welfare fraud, used by the UK&#39;s&amp;nbsp;Department for Work and Pensions (DWP), was &lt;a href=&quot;https://www.theguardian.com/society/2024/dec/06/revealed-bias-found-in-ai-system-used-to-detect-uk-benefits&quot;&gt;reported&lt;/a&gt;&amp;nbsp;as &quot;showing bias according to people’s age, disability, marital status and nationality&quot;. Although humans make the final decisions on welfare payments, it was noted that no &quot;fairness analysis has yet been undertaken in respect of potential bias centring on race, sex, sexual orientation and religion, or pregnancy, maternity and gender reassignment status&quot;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Cybersecurity, LLMs, tools, cloud&lt;/b&gt;: Amazon researchers &lt;a href=&quot;https://www.amazon.science/blog/model-produces-pseudocode-for-security-controls-in-seconds&quot;&gt;discuss&lt;/a&gt;&amp;nbsp;a new model &quot;that harnesses advanced AI capabilities to automate the creation of security controls, enabling faster, more efficient, and highly accurate generation of the rules [for AWS services&#39; configuration and alerts processing] that help users safeguard their cloud infrastructures&quot;, in a post entitled &quot;Model produces pseudocode for security controls in seconds&quot;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;GenAI, usage, law&lt;/b&gt;: the UK&#39;s Government Skills is piloting and seeking feedback on an AI-generated video used in its updated Civil Service expectations course as an optional module to help civil servants understand certain new legal responsibilities on equality: &quot;the first time an AI-generated video has been used to enhance learning on one of the cross-government courses hosted on Civil Service Learning&quot;. Hmm, AI creating a video to explain/teach new laws... I&#39;d like to know what the feedback was too! (recall that in a UK tax tribunal appeal, a party cited &quot;supporting&quot; rulings &lt;a href=&quot;https://www.lawgazette.co.uk/news/ai-hallucinates-nine-helpful-case-authorities/5118179.article&quot;&gt;that were actually hallucinated by AI&lt;/a&gt;)&lt;/li&gt;&lt;li&gt;&lt;b&gt;On-device ML, SLMs&lt;/b&gt;: Microsoft &lt;a href=&quot;https://blogs.windows.com/windowsexperience/2024/12/06/phi-silica-small-but-mighty-on-device-slm/&quot;&gt;explained&lt;/a&gt; its &quot;small but mighty&quot; on-device Small Language Model, Phi Silica (and see 13 Dec)&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;5 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Intellectual property, courts&lt;/b&gt;:&amp;nbsp;&lt;a href=&quot;https://www.judiciary.uk/the-impact-and-value-of-ai-for-ip-and-the-courts-a-speech-by-lord-justice-birss/&quot;&gt;Impact and Value of AI for IP and the Courts&lt;/a&gt;, speech by UK Deputy Head of Civil Justice&amp;nbsp;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;OpenAI, o1, testing, red teaming&lt;/b&gt;: system card &lt;a href=&quot;https://openai.com/index/openai-o1-system-card/&quot;&gt;released&lt;/a&gt; for OpenAI&#39;s o1 and o1-mini, describing safecoty work including external red teaming and frontier risk evaluations under OpenAI&#39;s &lt;a href=&quot;https://cdn.openai.com/openai-preparedness-framework-beta.pdf&quot;&gt;Preparedness Framework&lt;/a&gt;&amp;nbsp;(and see 18 Dec)&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Training data, privacy, PETs&lt;/b&gt;: NIST &lt;a href=&quot;https://www.nist.gov/blogs/cybersecurity-insights/data-pipeline-challenges-privacy-preserving-federated-learning&quot;&gt;discussion&lt;/a&gt; with certain winners of the UK-US PETs Prize Challenges, on &quot;real-world data pipeline challenges associated with privacy-preserving federated learning (PPFL) and explore upcoming solutions. Unlike traditional centralized or federated learning, &lt;i&gt;PPFL solutions prevent the organization training the model from looking at the training data.&lt;/i&gt; This means it’s impossible for that organization to assess the &lt;i&gt;quality&lt;/i&gt; of the training data – or even know if it has the right format. This issue can lead to several important challenges in PPFL deployments&quot;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;4 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Agents, gaming&lt;/b&gt;: Google &lt;a href=&quot;https://deepmind.google/discover/blog/genie-2-a-large-scale-foundation-world-model/&quot;&gt;introduced&lt;/a&gt;&amp;nbsp;its Genie 2, &quot;a foundation world model capable of generating an endless variety of action-controllable, playable 3D environments for training and evaluating embodied agents. Based on a &lt;i&gt;single prompt image&lt;/i&gt;, it can [create a video game that can] be played by a human or AI agent using keyboard and mouse inputs&quot;. Fascinating and impressive&lt;/li&gt;&lt;li&gt;&lt;b&gt;AI usage, science, weather&lt;/b&gt;:&amp;nbsp;&lt;a href=&quot;https://www.nature.com/articles/s41586-024-08252-9&quot;&gt;Probabilistic weather forecasting with machine learning&lt;/a&gt;&amp;nbsp;article on Google&#39;s GenCast model (authors include many Google researchers; open&amp;nbsp;&lt;a href=&quot;https://github.com/google-deepmind/graphcast&quot;&gt;GenCast code on GitHub&lt;/a&gt;&amp;nbsp;including links for data and model weights)&lt;/li&gt;&lt;li&gt;&lt;b&gt;Bias (gender), LLMs:&lt;/b&gt;&amp;nbsp;Apple paper&amp;nbsp;&lt;a href=&quot;https://machinelearning.apple.com/research/gender-bias-transfer&quot;&gt;Evaluating Gender Bias Transfer between Pre-trained and Prompt-Adapted Language Models&lt;/a&gt;. Language used in prompts matters. &quot;Our findings highlight the importance of ensuring fairness in pre-trained LLMs, especially when they are later used to perform downstream tasks via prompt adaptation&quot;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Employment, recruitment, data protection&lt;/b&gt;: the UK ICO &lt;a href=&quot;https://ico.org.uk/about-the-ico/our-information/disclosure-log/ic-343033-j1v7/&quot;&gt;published&lt;/a&gt;&amp;nbsp;the 42 advisory notes that it issued&amp;nbsp;following audits of organisations using AI in recruitment. Well worth a read for the points to consider/document if you&#39;re thinking of using AI for hiring&lt;/li&gt;&lt;li&gt;&lt;b&gt;International cooperation&lt;/b&gt;:&amp;nbsp;GPAI Belgrade Ministerial Declaration on AI &lt;a href=&quot;https://wp.oecd.ai/app/uploads/2024/12/GPAI-Belgrade-Declaration-final-3.pdf&quot;&gt;issued&lt;/a&gt; (yes, it&#39;s somewhat confusing that &quot;GPAI&quot; here stands for &quot;Global Partnership for Artificial Intelligence&quot; and not general purpose AI as per the EU AI Act! There are currently &lt;a href=&quot;https://gpai.ai/community/&quot;&gt;29 countries&lt;/a&gt; that are members of GPAI including the EU and many EU Member States, UK, US and also Australia, Canada, Singapore, New Zealand etc)&lt;/li&gt;&lt;li&gt;&lt;b&gt;Health, medical devices, sandboxes&lt;/b&gt;: to &quot;help test and improve the rules for AI-powered medical devices to ensure they reach patients quickly, safely and effectively&quot; and improve diagnosis and patient care, the UK Medicines and Healthcare products Regulatory Agency (MHRA) &lt;a href=&quot;https://www.gov.uk/government/news/mhra-trials-five-innovative-ai-technologies-as-part-of-pilot-scheme-to-change-regulatory-approach&quot;&gt;announced&lt;/a&gt; its selection of 5 AI technologies for its pilot AI Airlock regulatory sandbox scheme, &quot;where manufacturers can explore how best to collect evidence that could later be used to support the approval of their product&quot; under MHRA supervision in a virtual or simulated setting. The chosen AI uses were: targeting at risk patients with Chronic Obstructive Pulmonary Disease (COPD); using LLMs to improve the efficiency and accuracy of radiology reporting; AI performance monitoring platforms in hospitals (for drift); improving cancer care efficent; facilitating clinician decision-making&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;3 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Fundamental concepts:&lt;/b&gt;&amp;nbsp;Dentons has &lt;a href=&quot;https://www.youtube.com/watch?v=9iRcsOCLUe4&quot;&gt;published&lt;/a&gt; my video, initially intended only for internal training of lawyers generally on AI terminology and jargon&lt;/li&gt;&lt;li&gt;&lt;b&gt;Misrepresentating AI, biometrics, bias&lt;/b&gt;: FTC &lt;a href=&quot;https://www.ftc.gov/news-events/news/press-releases/2024/12/ftc-takes-action-against-intellivision-technologies-deceptive-claims-about-its-facial-recognition&quot;&gt;enforcement action&lt;/a&gt; &quot;for making false, misleading or unsubstantiated claims that its AI-powered facial recognition software was free of gender and racial bias and making other misleading claims about the technology&quot;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Multimodal&lt;/b&gt;: Amazon &lt;a href=&quot;https://www.aboutamazon.com/news/aws/amazon-nova-artificial-intelligence-bedrock-aws&quot;&gt;announced&lt;/a&gt; its Nova generation of multimodal foundation models. &quot;With the ability to process text, image, and video as prompts, customers can use Amazon Nova-powered generative AI applications to understand videos, charts, and documents, or generate videos and other multimedia content&quot;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;2 Dec 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Sustainability, data centers:&lt;/b&gt;&amp;nbsp;&lt;a href=&quot;https://www.reuters.com/technology/artificial-intelligence/amazon-pilot-ai-designed-material-carbon-removal-2024-12-02/&quot;&gt;reportedly&lt;/a&gt; Amazon has partnered with AI startup Orbital to trial a new (AI-designed!) material in its data centres for carbon capture, removing carbon dioxide from the air (&lt;a href=&quot;https://techcrunch.com/2024/12/03/amazon-teams-up-with-orbital-to-remove-co2-from-the-air-at-one-of-its-datacenters/&quot;&gt;another article&lt;/a&gt;)&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;29 Nov 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Tools&lt;/b&gt;: (algorithms for improved statistical models, not AI?) software to &quot;&lt;a href=&quot;https://www.ukri.org/news/new-data-analysis-tool-will-help-insurance-industrys-future/&quot;&gt;equip individual insurance firms&lt;/a&gt; to assess probable liabilities arising from their specific mix of products and customers&quot; and estimate needed cash reserves better for Solvency II purposes. Unlikely to be free/open source&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;28 Nov 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;GenAI, LinkedIn, detection, synthetic data&lt;/b&gt;: &lt;a href=&quot;https://www.wired.com/story/linkedin-ai-generated-influencers/&quot;&gt;Wired article&lt;/a&gt; on Originality AI&#39;s analysis showing that &quot;Over 54 percent of longer English-language posts on LinkedIn are likely AI-generated&quot;, &quot;indicating the platform’s embrace of AI tools has been a success&quot; (!)&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Government policy&lt;/b&gt;: ODI&#39;s&amp;nbsp;&lt;a href=&quot;https://theodi.org/insights/reports/global-policy-observatory-for-data-centric-ai/&quot;&gt;Global Policy Observatory for Data-centric AI report&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;ul&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&quot;Analysing 512 policy documents from 64 countries, we find that a small group of typically wealthier nations with robust open data practices are more likely to focus on data-centric AI topics. In contrast, low and middle-income countries (LMICs), which generally lack a focus on data-centric AI topics, may find their ability to engage in global AI governance efforts hindered.&quot;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;Recommends: international bodies supporting LMICs with guidance; investment in data-centric tools/toolkits; promoting equitable data sharing&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Human rights, risks, assessment, governance&lt;/b&gt;: the Council of Europe&#39;s Committee on AI (CAI) adopted the &lt;a href=&quot;https://rm.coe.int/cai-2024-16rev2-methodology-for-the-risk-and-impact-assessment-of-arti/1680b2a09f&quot;&gt;HUDERIA methodology&lt;/a&gt;&amp;nbsp;for the&amp;nbsp;risk and impact assessment of AI systems from the point of view of human rights, democracy and the rule of law, with the involvement of Turing Institute researchers (&lt;a href=&quot;https://www.turing.ac.uk/news/council-europe-adopts-turing-developed-human-rights-risk-and-impact-assessment-ai-systems?utm_source=Turing-Newsletter&amp;amp;utm_medium=Button_link&amp;amp;utm_campaign=Turing-Newsletter-Dec24#msdynmkt_trackingcontext=b98f1f0f-acdb-4087-8274-27fa76a0e8be&quot;&gt;Turing news&lt;/a&gt;&amp;nbsp;with further links; &quot;in 2025-2026 a &lt;i&gt;more detailed model&lt;/i&gt; will be developed and piloted&quot;).&amp;nbsp;&lt;b&gt;HUDERIA&amp;nbsp;&lt;/b&gt;comprises a context-based risk analysis (COBRA), stakeholder engagement process (SEP), risk &amp;amp; impact assessment, and mitigation plan&lt;/li&gt;&lt;ul&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;EU&lt;/b&gt;: the EU was &lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-11364-2024-INIT/en/pdf&quot;&gt;involved&lt;/a&gt; in negotiating HUDERIA as a non-binding instrument (NBI) &quot;to support the Parties to the &lt;a href=&quot;https://rm.coe.int/1680afae3c&quot;&gt;Council of Europe Framework Convention on Artificial Intelligence, Human Rights, Democracy and the Rule of Law&lt;/a&gt;&amp;nbsp;[&lt;a href=&quot;https://rm.coe.int/1680afae67&quot;&gt;explan memo&lt;/a&gt;] in the implementation of the risk and impact management obligations included in Chapter V of the Convention&quot;, and HUDERIA took account of the EU AI Act. HUDERIA&#39;s approval by the EU is &lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-16782-2024-INIT/en/pdf&quot;&gt;progressing&lt;/a&gt;. Current &lt;a href=&quot;https://www.coe.int/en/web/artificial-intelligence/the-framework-convention-on-artificial-intelligence&quot;&gt;signatories&lt;/a&gt;&amp;nbsp;to this Convention include the EU, UK and USA&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;EU AI Act&lt;/b&gt;: HUDERIA should be useful when considering &lt;i&gt;fundamental rights impact assessments&lt;/i&gt; of high-risk AI systems under the AI Act. Indeed, the HUDERIA document itself states, &quot;The HUDERIA can be used by both public &lt;i&gt;and private actors&lt;/i&gt; to aid in identifying and addressing risks and impacts to human rights, democracy and the rule of law throughout the lifecycle of AI systems&quot;, and that its main objectives include &quot;to promote compatibility and interoperability with existing and future guidance,standards and frameworks developed by relevant technical, professional and other organisations or bodies (such as ISO, IEC, ITU, CEN, CENELEC, IEEE, OECD, NIST), including the NIST AI Risk Management Framework and risk management &lt;i&gt;and fundamental rights impact assessment under the EU AI Act&lt;/i&gt;&quot;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;28 Nov 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;EU AI Act&lt;/b&gt;: AI Office&#39;s &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/policies/ai-pact&quot;&gt;AI Pact&lt;/a&gt; &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/events/webinar-exploring-architecture-ai-act&quot;&gt;webinar on the AI Act&#39;s architecture&lt;/a&gt; - &lt;a href=&quot;https://youtube.com/live/eLlSXs1f9Jc?feature=share&quot;&gt;recording&lt;/a&gt;, &lt;a href=&quot;https://ec.europa.eu/newsroom/dae/redirection/document/110608&quot;&gt;slides&lt;/a&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;EU &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/policies/ai-pact&quot;&gt;AI Pact&lt;/a&gt; (voluntary)&lt;/b&gt;: including&amp;nbsp;&lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/policies/ai-pact#ecl-inpage-Signatories-of-the-AI-Pact&quot;&gt;list of signatories&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Government policy&lt;/b&gt;: the Open Data Institute (ODI) report &lt;a href=&quot;https://theodi.org/insights/reports/global-policy-observatory-for-data-centric-ai/&quot;&gt;analysing&lt;/a&gt; 512 policy documents from 64 countries - &quot;we find that a small group of typically wealthier nations with robust open data practices are more likely to focus on data-centric AI topics. In contrast, low and middle-income countries (LMICs), which generally lack a focus on data-centric AI topics, may find their ability to engage in global AI governance efforts hindered&quot;. Recommendations:&lt;/li&gt;&lt;ul&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;Support LMICs via international organisations&#39; guidance on digital infrastructure and accessing high quality data resources&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;Invest in data-centric tools/toolkits&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;Promote equitable data sharing&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;Transparency on AI use&lt;/b&gt;: &lt;a href=&quot;https://www.theguardian.com/technology/2024/nov/28/uk-government-failing-to-list-use-of-ai-on-mandatory-register&quot;&gt;reportedly&lt;/a&gt;&amp;nbsp;the UK government was failing to list is use of AI on mandatory register (now see 17 Dec)&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;27 Nov 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Data protection, training, enforcement, Italy&lt;/b&gt;: if &quot;selling&quot; personal data for AI training, GDPR still applies. Italy&#39;s Garante &lt;a href=&quot;https://www.garanteprivacy.it/web/guest/home/docweb/-/docweb-display/docweb/10077129&quot;&gt;issued a warning&lt;/a&gt;&amp;nbsp;to a news group that sharing its editorial content (including archive) with OpenAI could likely infringe GDPR&#39;s provisions on special category data, criminal offence data, privacy notices and data subject rights. (Machine translation) &quot;all editorial content will be used by OpenAI to allow users [of the ChatGPT service, ed.] to carry out &lt;i&gt;real-time searches&lt;/i&gt; for current news, with the simultaneous provision of a summary (generated by OpenAI artificial intelligence systems) and a direct link to the news item itself” and that “all editorial content will also be used by OpenAI to improve its services and train its artificial intelligence algorithms”.&lt;/li&gt;&lt;ul&gt;&lt;li&gt;From the associated&amp;nbsp;&lt;a href=&quot;https://www.garanteprivacy.it/home/docweb/-/docweb-display/docweb/10076913https://www.garanteprivacy.it/home/docweb/-/docweb-display/docweb/10076913&quot;&gt;news item&lt;/a&gt;&amp;nbsp;of 29 Nov (machine translation): &quot;Digital newspaper archives store the stories of millions of people, with information, details, even extremely sensitive personal data that cannot be licensed for use by third parties to train artificial intelligence, without due precautions... Based on the information received, the Authority believes that the processing activities are intended to involve a &lt;i&gt;large volume of personal data, including sensitive and judicial data&lt;/i&gt;, and that the impact assessment [DPIA], carried out by the company and transmitted to Garante, does not sufficiently analyze the &lt;i&gt;legal basis&lt;/i&gt; by virtue of which the publisher could transfer or license for use by third parties the personal data present in its archive to OpenAI, so that it can process them to train its algorithms [the DPIA cited legitimated interest]. Finally, the warning notice highlights how the information and transparency obligations towards the interested parties do not appear to have been sufficiently fulfilled and that [the controller] is not in a position to guarantee the latter the rights they are entitled to under European privacy legislation, in particular the &lt;i&gt;right to object&lt;/i&gt;&quot;&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;Human rights&lt;/b&gt;: &lt;a href=&quot;https://www.judiciary.uk/speech-by-the-master-of-the-rolls-are-rights-sufficiently-human-in-the-age-of-the-machine/&quot;&gt;are&amp;nbsp;rights sufficiently human in the age of the machine?&lt;/a&gt; - speech by UK Master of the Rolls&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;26 Nov 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Data centers, clean energy, sustainability&lt;/b&gt;: &lt;a href=&quot;https://www.reuters.com/technology/artificial-intelligence/how-ai-cloud-computing-may-delay-transition-clean-energy-2024-11-21/&quot;&gt;concerns&lt;/a&gt; that increasing power demands from data centres for AI processing will delay the world&#39;s transition to clean energy (some companies are &lt;a href=&quot;https://qz.com/amazon-google-microsoft-nuclear-power-ai-data-centers-1851673653&quot;&gt;going for&lt;/a&gt; nuclear power to reduce carbon emissions, even banks not just big tech: paywalled &lt;a href=&quot;https://www.ft.com/content/477fa0d4-fdea-4235-b8af-9cabd64a81f0&quot;&gt;FT article&lt;/a&gt;)&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Misrepresenting AI capabilities&lt;/b&gt;: &lt;a href=&quot;https://www.ftc.gov/news-events/news/press-releases/2024/11/ftc-takes-action-against-evolv-technologies-deceiving-users-about-its-ai-powered-security-screening&quot;&gt;US FTC action&lt;/a&gt;&amp;nbsp;over allegations of false claims about the extent to which AI-powered security screening system can detect weapons and ignore harmless personal items, including in school settings&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Public sector, government, AI usage&lt;/b&gt;: Google Cloud-commissioned report on genAI -&amp;nbsp;&lt;a href=&quot;https://blog.google/around-the-globe/google-europe/united-kingdom/ai-could-be-the-key-to-unlocking-a-more-efficient-uk-public-sector/&quot;&gt;news item&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.publicfirst.co.uk/generative-ai-public-sector.html&quot;&gt;summary&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.publicfirst.co.uk/wp-content/uploads/2024/11/AI-and-the-Public-Sector_final.pdf&quot;&gt;PDF&lt;/a&gt;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Shadow AI&lt;/b&gt;: Strategy Insights survey - &lt;a href=&quot;https://www.infosecurity-magazine.com/news/over-third-firms-struggling-shadow/&quot;&gt;over a third of organisations&lt;/a&gt; struggled to monitor use by employees (even cybersecurity staff) of non-approved AI tools, particularly those integrated with legacy systems&lt;/li&gt;&lt;li&gt;&lt;b&gt;Testing, red teaming&lt;/b&gt;: US Cybersecurity and Infrastructure Security Agency (CISA)&amp;nbsp;&lt;a href=&quot;https://www.cisa.gov/news-events/news/ai-red-teaming-applying-software-tevv-ai-evaluations&quot;&gt;on&lt;/a&gt;&amp;nbsp;how AI red teaming (third-party safety and security evaluation of AI systems) must fit into the existing framework for AI Testing, Evaluation, Validation and Verification (TEVV) and into software TEVV&lt;/li&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;25 Nov 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;National security, defence, cybersecurity&lt;/b&gt;: the UK &lt;a href=&quot;https://www.gov.uk/government/news/uk-and-its-allies-must-stay-one-step-ahead-in-new-ai-arms-race&quot;&gt;announced&lt;/a&gt;&amp;nbsp;it will part-fund a new&amp;nbsp;Laboratory for AI Security Research (LASR) that will &quot;partner with world-leading experts from UK universities, the intelligence agencies and industry to boost Britain’s cyber resilience and support growth... to assess the impact of AI on our national security&quot; including collaboration with Five Eyes countries and NATO allies&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Open source, tools, models, data&lt;/b&gt;: Anthropic &lt;a href=&quot;https://www.anthropic.com/news/model-context-protocol&quot;&gt;released&lt;/a&gt; its open source model context protocol (MCP), &quot;an open standard that enables developers to build secure, two-way connections between their data sources and AI-powered tools&quot;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;22 Nov 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Court judgments, genAI,&amp;nbsp;&lt;/b&gt;&lt;b&gt;Argentina&lt;/b&gt;: replacing a previous AI system PROMETEA, OpenAI&#39;s ChatGPT&amp;nbsp;&lt;a href=&quot;https://restofworld.org/2024/buenos-aires-courts-adopt-chatgpt-draft-rulings/&quot;&gt;is now being used&lt;/a&gt;&amp;nbsp;in Buenos Aires for contentious administrative and tax matters, reviewing uploaded case documents and drafting judgments (the first cut only, with human review, it seems): &quot;20 rulings it has drafted have all been reviewed by a lawyer and approved by the deputy attorney&quot;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Work, employees&lt;/b&gt;: OECD Global Deal group on &lt;a href=&quot;https://oecd.ai/en/wonk/global-deal&quot;&gt;social dialogue &amp;amp; workplace use of AI&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;21 Nov 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;AI PCs&lt;/b&gt;: IBM survey -&amp;nbsp;AI PCs offered &quot;potentially transformative impact on people’s lives, saving individuals roughly 240 minutes a week on routine digital tasks&quot;, but &quot;current AI PC owners spend longer on tasks than their counterparts using traditional PCs&quot;, more consumer education needed&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Financial services&lt;/b&gt;: &lt;a href=&quot;https://www.bankofengland.co.uk/report/2024/artificial-intelligence-in-uk-financial-services-2024&quot;&gt;third survey&lt;/a&gt; by UK Bank of England &amp;amp; Financial Conduct Authority on AI and machine learning in UK FS including use/adoption, third-party exposure, automated decision-making, materiality, understanding of AI systems, benefits/risks, constraints on use (data protection top), governance &amp;amp; accountability. The exec summary is worth a read if short on time!&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Countries&lt;/b&gt;: Stanford University&#39;s Human-Centered Artificial Intelligence (HAI) center&#39;s 2024&amp;nbsp;&lt;a href=&quot;https://hai.stanford.edu/news/global-ai-power-rankings-stanford-hai-tool-ranks-36-countries-ai&quot;&gt;Global AI Power Rankings: Stanford HAI Tool Ranks 36 Countries in AI&lt;/a&gt; using its Global Vibrancy Tool; &quot;the U.S. is the global leader in artificial intelligence, followed by China and the United Kingdom. The ranking also highlights the rise of smaller nations such as&amp;nbsp;&lt;i&gt;Singapore&lt;/i&gt;&amp;nbsp;when evaluated on both absolute and per capita bases...&quot;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Red teaming&lt;/b&gt;: OpenAI &lt;a href=&quot;https://openai.com/index/advancing-red-teaming-with-people-and-ai/&quot;&gt;published&lt;/a&gt; 2 papers on &lt;a href=&quot;https://cdn.openai.com/papers/openais-approach-to-external-red-teaming.pdf&quot;&gt;external&lt;/a&gt; and &lt;a href=&quot;https://cdn.openai.com/papers/diverse-and-effective-red-teaming.pdf&quot;&gt;automated&lt;/a&gt; red teaming of AI models/systems&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Religion&lt;/b&gt;!:&amp;nbsp;&lt;a href=&quot;https://www.theguardian.com/technology/2024/nov/21/deus-in-machina-swiss-church-installs-ai-powered-jesus&quot;&gt;Swiss church installs AI-powered Jesus&lt;/a&gt;&amp;nbsp;instead of priests&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;20 Nov 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Cybersecurity:&lt;/b&gt;&amp;nbsp;EU Cyber Resilience Act (CRA) &lt;a href=&quot;https://eur-lex.europa.eu/eli/reg/2024/2847/oj/eng&quot;&gt;published&lt;/a&gt; in OJ, aiming to improve tge cyber security of &quot;products with digital elements&quot;&amp;nbsp;by regulating the making available of such products on the EU market to ensure their cybersecurity, including &quot;essential cybersecurity requirements&quot; for their design, development and production, obligations for economic operators in relation to their cybersecurity, and cybersecurity requirements for vulnerability handling processes by their manufacturers during the time they are expected to be in use, and obligations for economic operators regarding those processes.&amp;nbsp;Significance for AI? &lt;a href=&quot;https://eur-lex.europa.eu/eli/reg/2024/2847/oj/eng#art_12.tit_1&quot;&gt;Art.12&lt;/a&gt;, &lt;a href=&quot;https://eur-lex.europa.eu/eli/reg/2024/2847/oj/eng#rct_51&quot;&gt;Rec.51&lt;/a&gt;:&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Products with digital elements classified as &lt;i&gt;high-risk AI systems&lt;/i&gt; under the EU AI Act will be &lt;i&gt;deemed&lt;/i&gt; to comply with the AI Act&#39;s &lt;a href=&quot;http://bit.ly/eu-aiact#15&quot;&gt;Art.15&lt;/a&gt; cybersecurity requirements &lt;i&gt;if&lt;/i&gt; the product and the manufacturer&#39;s processes meet the CRA&#39;s essential cybersecurity requirements in CRA Annex I, but only to the extent the CRA declaration of conformity &quot;demonstrates&quot; achievement of the level of cybersecurity protection Art.15 requires.&amp;nbsp;The assessment should take account of risks to an AI system&#39;s cyber resilience&amp;nbsp;as regards &lt;i&gt;attempts by unauthorised third parties to alter its use, behaviour or performance&lt;/i&gt;, including AI specific vulnerabilities such as &lt;i&gt;data poisoning or adversarial attacks&lt;/i&gt;, as well as risks to fundamental rights, in accordance with the AI Act&lt;/li&gt;&lt;li&gt;There are nuances, e.g. &quot;&lt;i&gt;important &lt;/i&gt;products with digital elements&quot; (&lt;a href=&quot;https://eur-lex.europa.eu/eli/reg/2024/2847/oj/eng#art_7.tit_1&quot;&gt;Art.7&lt;/a&gt;, Ann.3) and &quot;&lt;i&gt;critical&lt;/i&gt; products with digital elements&quot; (&lt;a href=&quot;https://eur-lex.europa.eu/eli/reg/2024/2847/oj/eng#art_8.tit_1&quot;&gt;Art.8&lt;/a&gt;, Ann.4) that are high-risk AI systems will be subject to the CRA&#39;s conformity assessment procedures in so far as the CRA&#39;s essential cybersecurity requirements are concerned, but the AI Act&#39;s conformity assessment for all other aspects&lt;/li&gt;&lt;li&gt;Manufacturers of products with digital elements classified as&amp;nbsp;&lt;i&gt;high-risk AI systems&lt;/i&gt;&amp;nbsp;under the AI Act&amp;nbsp;may participate in AI regulatory sandboxes under the AI Act&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;EU AI Act&lt;/b&gt;: AI Office&#39;s updated&amp;nbsp;&lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/faqs/general-purpose-ai-models-ai-act-questions-answers&quot;&gt;GPAI models&#39; Code of Practice FAQ / Q&amp;amp;A&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;GenAI, synthetic data, deepfakes, provenance, detection, risks, testing, management&lt;/b&gt;: NIST report &lt;a href=&quot;https://www.nist.gov/publications/reducing-risks-posed-synthetic-content-overview-technical-approaches-digital-content&quot;&gt;Reducing Risks Posed by Synthetic Content An Overview of Technical Approaches to Digital Content Transparency&lt;/a&gt;, on&amp;nbsp;existing standards, tools, methods, and practices, and potential development of further science-backed standards and techniques, for: authenticating content and tracking its provenance; labeling synthetic content, such as using watermarking; detecting synthetic content; preventing genAI from producing CSAM or non-consensual intimate imagery of real individuals (including intimate digital depictions of an identifiable individual&#39;s body/body parts); testing software used for the above purposes; and auditing and maintaining synthetic content.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Health, medical images&lt;/b&gt;: &lt;a href=&quot;https://futurism.com/neoscope/experts-alarmed-medical-scans-grok&quot;&gt;experts&#39; alarm&lt;/a&gt; over people being encouraged to upload medical scans to Grok AI, including concerns on transparency, privacy, accuracy (reportedly it misidentified broken clavicle for dislocated shoulder, didn&#39;t recognise tuberculosis, mistook benign cyst for test*cles)&lt;/li&gt;&lt;li&gt;&lt;b&gt;International cooperation&lt;/b&gt;: EU and Singapore &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/news/eu-and-singapore-strengthen-cooperation-ai-safety&quot;&gt;signed&lt;/a&gt;&amp;nbsp;an Administrative Arrangement on cooperation between the EU’s AI Office and Singapore’s AI Safety Institute, &quot;to address the safety of general-purpose AI models through information exchanges and best practices, joint testing and evaluations, development of tools and benchmarks, standardisation activities, as well as research on how to advance safe and trustworthy AI&quot; and to exchange views on trends and future technological developments in the field of AI&lt;/li&gt;&lt;li&gt;&lt;b&gt;US, government policy, laws&lt;/b&gt;: the Computer &amp;amp; Communications Industry Association (CCIA) &lt;a href=&quot;https://ccianet.org/wp-content/uploads/2024/12/CCIA_State-Artificial-Intelligence-Landscape.pdf&quot;&gt;published&lt;/a&gt;&amp;nbsp;its 2024 State Landscape Artificial Intelligence, outlining the major trends across the 50 US state legislatures, and highlighting key states expected to be active in the upcoming session&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;19 Nov 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Models, testing&lt;/b&gt;: from the UK Artificial Intelligence Safety Institute (AISI) and US Artificial Intelligence Safety Institute, a &lt;a href=&quot;https://www.aisi.gov.uk/work/pre-deployment-evaluation-of-anthropics-upgraded-claude-3-5-sonnet&quot;&gt;joint pre-deployment evaluation&lt;/a&gt; of Anthropic&#39;s upgraded Claude 3.5 Sonnet model (see also 22 Oct 24)&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;18 Nov 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;AI usage, science, health, weather, maths, physics&lt;/b&gt;: Google &lt;a href=&quot;https://blog.google/technology/ai/google-ai-big-scientific-breakthroughs-2024/&quot;&gt;highlighted&lt;/a&gt; some scientific breakthroughs enabled by AI and newly-developed AI models - protein structure prediction (Deepmind, free database) to assist developing new medicines, fight antibiotic resistance, tackle plastic pollution; mapping human brain in more detail to assist health research (public dataset); more accurate &lt;a href=&quot;https://blog.google/technology/ai/expanding-flood-forecasting-coverage-helping-partners/&quot;&gt;flood forecasting&lt;/a&gt; to help save lives; spotting wildfires earlier to help stop them faster; predicting weather more quickly and accurately (open source model code); advancing AI&#39;s mathematical &amp;amp; geometry reasoning (AlphaGeometry2, AlphaProof); more accurate predictions of chemical reactivity/kinetics using quantum computing for chemistry simulations; accelerating materials science which could help produce more sustainable solar cells, batteries, superconductors (some predictions in an open database); assisting nuclear fusion research&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;AI usage, potential&lt;/b&gt;: views of Google&#39;s&amp;nbsp;Demis Hassabis &amp;amp; James Manyika - &lt;a href=&quot;https://fortune.com/2024/11/18/demis-hassabis-james-manyika-ai-will-help-us-understand-very-fabric-of-reality/&quot;&gt;AI will help us understand the very fabric of reality&lt;/a&gt;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Data protection, LIAs&lt;/b&gt;: Information Accountability Foundation (IAF) &lt;a href=&quot;https://www.informationaccountability.org/_files/ugd/ffea53_dbad4aba7fe9424899b0f4f575b56c46.pdf&quot;&gt;published&lt;/a&gt;&amp;nbsp;Assessments for an AI World - Legitimate Interest Assessment, with a draft model LIA on &quot;how to demonstrate legitimate interest multi-dimensional balancing when AI is the processing activity&quot;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Future, limits&lt;/b&gt;: view that genAI has &quot;&lt;a href=&quot;https://medium.com/predict/ai-has-officially-hit-a-dead-end-cf260ae5b2de&quot;&gt;hit a dead end&lt;/a&gt;&quot; and will stagnate...&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Product liability&lt;/b&gt;: EU Product Liability Directive &lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32024L2853&quot;&gt;published&lt;/a&gt; in the OJ, applicable from 9 Dec 2026. Significance for AI? For the purposes of no-fault liability for defective products:&lt;/li&gt;&lt;ul&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&quot;Product&quot; explicitly includes software like AI systems, including where supplied via SaaS&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&amp;nbsp;&quot;developer or producer of software, including AI system providers&quot; under the AI Act, &quot;&lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32024L2853#rct_13&quot;&gt;should be treated as a manufacturer&lt;/a&gt;&quot; under this Directive&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;Where a substantial modification is made e.g. due to the continuous learning of an AI system, the substantially modified product should be considered to be made available on the market or put into service &lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32024L2853#rct_40&quot;&gt;at the time that modification is actually made&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;National courts &lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32024L2853#rct_48&quot;&gt;should&lt;/a&gt; presume the defectiveness of a product or the causal link between the damage and the defectiveness, or both, where, notwithstanding the defendant’s disclosure of information, it would be &lt;i&gt;excessively difficult&lt;/i&gt; for the claimant, in particular due to the technical or scientific complexity of the case, to prove the defectiveness or the causal link, or both.&amp;nbsp;Technical or scientific complexity should be determined by national courts on a case-by-case basis, taking into account various &lt;i&gt;factors &lt;/i&gt;including the &lt;i&gt;complex nature of the technology used such as machine learning&lt;/i&gt;, and the &lt;i&gt;complex nature of the causal link&lt;/i&gt;, such as a link that, in order to be proven, would require the claimant to explain the &lt;i&gt;inner workings of an AI system&lt;/i&gt;.&amp;nbsp;While a claimant should provide arguments to demonstrate excessive difficulties, proof of such difficulties should not be required. For example, in a &lt;i&gt;claim concerning an AI system,&lt;/i&gt; the claimant should, for the court to decide that excessive difficulties exist, neither be required to explain the AI system’s specific characteristics nor how those characteristics make it harder to establish the causal link.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;17 Nov 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Deepfakes&lt;/b&gt;: Sir David Attenborough &lt;a href=&quot;https://www.radiotimes.com/tv/documentaries/david-attenborough-ai-voice-newsupdate/&quot;&gt;against&lt;/a&gt; his voice being cloned by AI&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;14 Nov 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;AI usage, phone scams, fraud&lt;/b&gt;: an excellent beneficial use of AI is telecomms provider&amp;nbsp;&lt;a href=&quot;https://news.virginmediao2.co.uk/o2-unveils-daisy-the-ai-granny-wasting-scammers-time/&quot;&gt;O2&#39;s AI &quot;granny&quot;, Daisy&lt;/a&gt;, trained on &quot;real scambaiter content&quot; and designed to &quot;answer calls in real time from fraudsters, keeping them on the phone and away from customers for as long as possible... [Daisy&#39;s] mission is to talk with fraudsters and waste as much of their time as possible with human-like rambling chat to keep them away from real people, while highlighting the need for consumers to stay vigilant as the UK faces a fraud epidemic... Able to interact with scammers in real time without any input from her creators, O2 has put Daisy to work around the clock answering dodgy calls. Daisy combines various AI models which work together to listen and respond to fraudulent calls instantaneously and is so lifelike it has successfully kept numerous fraudsters on calls for 40 minutes at a time... [Daisy] has told frustrated scammers meandering stories of her family, talked at length about her passion for knitting and provided exasperated callers with false personal information including made-up bank details. By tricking the criminals into thinking they were defrauding a real person and playing on scammers biases about older people, Daisy has prevented them from targeting real victims and, most importantly, has exposed the common tactics used so customers can better protect themselves&quot;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Query: exactly how is Daisy triggered to answer a call? Can O2 customers opt in to use Daisy? The accompany video (see link above or &lt;a href=&quot;https://www.youtube.com/watch?v=RV_SdCfZ-0s&quot;&gt;Youtube&lt;/a&gt;) says, &quot;If you want to help Daisy and O2 to ruin a scammer&#39;s day, you can report scam numbers to 7726&quot;. Does that mean that if calls are made to O2 customers&#39; numbers from numbers reported to 7726 that O2 has determined are used by fraudsters, O2 intervenes and has Daisy answer the call instead of the customer?&lt;/li&gt;&lt;li&gt;As one customer &lt;a href=&quot;https://community.o2.co.uk/t5/Discussions-Feedback/DAIsy-AI-Granny/td-p/1763185&quot;&gt;said&lt;/a&gt;, do we really want O2 to be intercepting calls? More info on how Daisy works would be very helpful. I can imagine a troublemaker deliberately reporting a &lt;i&gt;legitimate &lt;/i&gt;person&#39;s phone number to 7726, so that when that person tries to call an O2 number, they get Daisy instead of whoever they were trying to call!&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;Cybersecurity&lt;/b&gt;: from the UK AISI, &lt;a href=&quot;https://www.aisi.gov.uk/work/safety-case-template-for-inability-arguments&quot;&gt;Safety case template for ‘inability’ arguments&lt;/a&gt; - &quot;How to write part of a safety case showing a system does not have &lt;i&gt;offensive &lt;/i&gt;cyber capabilities&quot; (&lt;a href=&quot;https://arxiv.org/abs/2411.08088&quot;&gt;paper&lt;/a&gt;)&lt;/li&gt;&lt;li&gt;&lt;b&gt;EU AI Act&lt;/b&gt;: first draft of GPAI Code of Practice &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/library/first-draft-general-purpose-ai-code-practice-published-written-independent-experts&quot;&gt;published&lt;/a&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;There&#39;s also a tentative &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/policies/ai-code-practice#timeline&quot;&gt;future chronological timeline&lt;/a&gt; of next steps on the Code&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;GenAI poetry&lt;/b&gt;: research &lt;a href=&quot;https://www.nature.com/articles/s41598-024-76900-1&quot;&gt;indicating&lt;/a&gt; that AI-generated poetry is indistinguishable from human-written poetry and even rated more favorably by the people involved! (&lt;a href=&quot;https://www.forbes.com/sites/torconstantino/2024/11/15/people-cant-tell-ai-from-shakespeare---they-prefer-ais-verse-study/&quot;&gt;Forbes article&lt;/a&gt;)&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Frameworks, critical infrastructure&lt;/b&gt;: from the US DHS, consulting with AI Safety &amp;amp; Security Board: &lt;a href=&quot;https://www.dhs.gov/sites/default/files/2024-11/24_1114_dhs_ai-roles-and-responsibilities-framework-508.pdf&quot;&gt;Roles and Responsibilities Framework for Artificial Intelligence in Critical Infrastructure&lt;/a&gt;, on deploying AI in critical infrastructure (but more generally useful) and the roles of cloud infrastructure providers, AI developers, critical infrastructure owners &amp;amp; operators, civil society and the public sector/government. Includes AI roles/responsibilities matrix and glossary.&lt;/li&gt;
&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Innovation, risks, red-teaming&lt;/b&gt;: from UK DSIT Responsible Technology Adoption Unit (RTA/RTAU), a&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/government/publications/the-model-for-responsible-innovation&quot;&gt;Model for Responsible Innovation&lt;/a&gt;&amp;nbsp;&quot;to help teams across the public sector and beyond to innovate responsibly with data and AI&quot; (but of interest to private organisations too) by:&lt;ul&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;Setting out a vision for what responsible innovation in AI looks like, and the component Fundamentals and Conditions required to build trustworthy AI&amp;nbsp;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;Providing a practical tool public sector teams can use to rapidly identify potential risks associated with AI development and deployment, and understand how to mitigate them - RTA uses this model in red-teaming workshops mapping data and AI projects against the model to rapidly identify where risks might arise and prioritise actions to ensure a trustworthy approach.&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Product safety&lt;/b&gt;: unsurprisingly, AI and machine learning feature in the&amp;nbsp;&lt;a href=&quot;https://assets.publishing.service.gov.uk/media/6736224354652d03d51611a8/opss-horizon-scan-1.pdf&quot;&gt;first horizon scan report&lt;/a&gt;&amp;nbsp;by the UK Office for Product Safety &amp;amp; Standards (OPSS), and the scan&#39;s taxonomy of technologies included computational tools and platforms that collect, analyse or leverage data, including AI and machine learning (advanced analysis and algorithmic technologies that can interpret existing information and automate or support decision-making and action like AI, ML, neural networks, computer vision), cybersecurity and data platforms, and smart technology and internet of things (IoT)&lt;/li&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;13 Nov 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Data protection, bias, Italy&lt;/b&gt;: Garante &lt;a href=&quot;https://www.garanteprivacy.it/web/guest/home/docweb/-/docweb-display/docweb/10074601&quot;&gt;fined&lt;/a&gt;&amp;nbsp;a food delivery company €2.6m and ordered various measures e.g. changing how it processes its riders&#39; data through a digital platform and &quot;verify that the algorithms used to book and assign orders for food and other products do not result into discrimination&quot; including on automated decision-making (&lt;a href=&quot;https://www.garanteprivacy.it/web/guest/home/docweb/-/docweb-display/docweb/9677377#english&quot;&gt;news item&lt;/a&gt;&amp;nbsp;in English;&amp;nbsp;&lt;a href=&quot;https://www.garanteprivacy.it/web/guest/home/docweb/-/docweb-display/docweb/10074840&quot;&gt;another&lt;/a&gt;). Infringements noted included privacy notices/transparency, safeguards to ensure accuracy and fairness of algorithmic results used to rate riders&#39; performance, lack of procedures to enforce the right to human interventionand contest the algorithms&#39; decisions (which sometimes excluded riders from work assignments)&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;EU AI Act&lt;/b&gt;: the European Commission &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/news/commission-launches-consultation-ai-act-prohibitions-and-ai-system-definition&quot;&gt;launched&lt;/a&gt;&amp;nbsp;its &lt;a href=&quot;https://ec.europa.eu/eusurvey/runner/Prohibitions-and-Definition-Survey-2024&quot;&gt;consultation&lt;/a&gt;&amp;nbsp;(ending 11 Dec 24) on&amp;nbsp;AI Act prohibitions and the AI system definition&lt;/li&gt;&lt;li&gt;&lt;b&gt;GenAI, media literacy&lt;/b&gt;: Ofcom paper on &lt;a href=&quot;https://www.ofcom.org.uk/siteassets/resources/documents/research-and-data/media-literacy-research/making-sense-of-media/future-technology-trends-and-media-literacy/future-technology-and-media-lit-applications-of-generative-ai.pdf?v=384879&quot;&gt;Future Technology and Media Literacy: Applications of Generative AI&lt;/a&gt;, covering the news sector &amp;amp; personalisation, personalisation &amp;amp; adaptation, content creation &amp;amp; education, and data protection concerns with genAI&lt;/li&gt;&lt;li&gt;&lt;b&gt;Government policy, AI risks, AI benefits&lt;/b&gt;: OECD report&amp;nbsp;&lt;a href=&quot;https://www.oecd.org/content/dam/oecd/en/publications/reports/2024/11/assessing-potential-future-artificial-intelligence-risks-benefits-and-policy-imperatives_8a491447/3f4e3dfb-en.pdf&quot;&gt;Assessing Potential Future Artificial Intelligence Risks, Benefits nd Policy Imperatives&lt;/a&gt;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Justice, law enforcement&lt;/b&gt;: EU Council&#39;s &lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-15442-2024-REV-1/en/pdf&quot;&gt;draft conclusions&lt;/a&gt; on the use of AI in the field of justice (final conclusions from 4 Dec 24 meeting not yet available)&lt;/li&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;12 Nov 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Bias, Denmark&lt;/b&gt;: &lt;a href=&quot;https://www.amnesty.org/en/documents/eur18/8709/2024/en/&quot;&gt;Amnesty report&lt;/a&gt; Coded Injustice: Surveillance and Discrimination in Denmark’s Automated Welfare State, on &quot;how the sweeping use of fraud detection algorithms, paired with mass surveillance practices, has led people to unwillingly –or even unknowingly– forfeit their right to privacy, and created an atmosphere of fear&quot; (&lt;a href=&quot;https://fortune.com/europe/2024/11/13/denmark-renowned-safety-net-turns-into-a-political-battleground-ai-algorithms-target-welfare-recipients/&quot;&gt;Fortune article&lt;/a&gt;)&lt;/li&gt;&lt;li&gt;&lt;b&gt;Bias, Netherlands, ethnicity&lt;/b&gt;: &lt;a href=&quot;https://nltimes.nl/2024/11/12/government-refund-10000-students-discriminatory-duo-fraud-checks&quot;&gt;reportedly&lt;/a&gt; the Dutch government is refunding &amp;gt;10k students &quot;who were unjustly flagged for student finance fraud by an algorithm developed by the Education Executive Agency (DUO)&quot; after an investigation found it to be &quot;discriminatory, targeted students based on arbitrary risk factors that disproportionately affected those from immigrant backgrounds, particularly those of Turkish and Moroccan descent&quot;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;11 Nov 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Automated decision-making (ADM)&lt;/b&gt;: &lt;a href=&quot;https://www.theguardian.com/uk-news/2024/nov/11/ai-tool-could-influence-home-office-immigration-decisions-critics-say&quot;&gt;controversy&lt;/a&gt; over a UK Home Office tool proposing enforcement against migrants/asylum seekers. Government said its algorithms are rules-based not AI/ML and that humans remain responsible; objectors fear rubber-stamping of biased decisions, raised transparency regarding AI use.&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Bias (age), health&lt;/b&gt;: &lt;a href=&quot;https://www.aisnakeoil.com/p/does-the-uks-liver-transplant-matching&quot;&gt;does the UK’s liver transplant matching algorithm systematically exclude younger patients?&lt;/a&gt;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Ethics, sentience, feelings?&lt;/b&gt;: &lt;a href=&quot;https://arstechnica.com/ai/2024/11/anthropic-hires-its-first-ai-welfare-researcher/&quot;&gt;reportedly&lt;/a&gt;&amp;nbsp;Anthropic previously hired an &quot;AI welfare&quot; researcher &quot;to explore whether future AI models might deserve moral consideration and protection&quot;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Spatial intelligence, physical world&lt;/b&gt;: &lt;a href=&quot;https://nianticlabs.com/news/largegeospatialmodel?hl=en&amp;amp;utm_source=www.garbageday.email&amp;amp;utm_medium=newsletter&amp;amp;utm_campaign=right-wing-social-networks-don-t-work&amp;amp;_bhlid=4528b8205f253061720f30633407d8060dc88335&quot;&gt;Niantic&#39;s Large Geospatial Model&lt;/a&gt; is being built using player-contributed scans of public real-world geographic locations, as part of its Visual Positioning System (VPS), to enable computers to perceive and understand physical spaces e.g. for augmented reality, robots&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;8 Nov 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;GenAI, chatbots, LLMs&lt;/b&gt;: UK Ofcom&#39;s &lt;a href=&quot;https://www.ofcom.org.uk/online-safety/illegal-and-harmful-content/open-letter-to-uk-online-service-providers-regarding-generative-ai-and-chatbots/&quot;&gt;open letter&lt;/a&gt; to online service providers on how the UK Online Safety Act (OSA) will apply to generative AI and chatbots. E.g.&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Sites enabling users to share AI-generated text, images, videos with other users such as via group chats; services letting users upload or create their own chatbots available to other users like chatbots mimicking real/fake people; any genAI content that&#39;s shared is considered &quot;user-generated&quot; including deepfake fraud material.&lt;/li&gt;&lt;li&gt;GenAI tools enabling searching of more than one site/database are OSA-regulated &quot;search services&quot; (e.g. tools using live search results)&lt;/li&gt;&lt;li&gt;Sites/apps with genAI tools that can generate p*rn material are also OSA-regulated (so, ensure guardrails that prevent this!)&lt;/li&gt;&lt;li&gt;Measures from draft Ofcom Codes to help services and users include having a named person accountable for OSA compliance, having an adequately resourced, well trained content moderation function for swift takedown of illegal content and child protection; using &quot;highly effective age assurance&quot; for child protection; having easily-accessible, usable reporting &amp;amp; complaints processes.&lt;/li&gt;&lt;/ul&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Regulatory cooperation, international&lt;/b&gt;: the UK&amp;nbsp;Digital Regulation Cooperation Forum (DRCF) &lt;a href=&quot;https://www.drcf.org.uk/news-and-events/news/joint-statement-from-indrc-members-following-workshop-with-oecd/&quot;&gt;announced&lt;/a&gt; a joint OECD and The International Network for Digital Regulation Cooperation (INDRC) &lt;a href=&quot;https://www.oecd.org/en/events/2024/11/oecd-indrc-joint-workshop-on-the-interplay-between-digital-regulatory-frameworks.html&quot;&gt;workshop&lt;/a&gt; to discuss the &quot;interplay between digital regulatory frameworks – challenges and opportunities of structural collaboration&quot;, and published the resulting &lt;a href=&quot;https://www.drcf.org.uk/projects/projects/international-network-for-digital-regulation-cooperation-indrc/&quot;&gt;joint statement&lt;/a&gt;&amp;nbsp;&quot;to demonstrate INDRC members’ commitment to continued collaboration and dialogue on key matters of digital regulatory significance&quot;&lt;/li&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;7 Nov 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;AI usage&lt;/b&gt;: Wendy&#39;s &lt;a href=&quot;https://qz.com/wendys-ai-1-frosty-demand-q3-2024-retail-1851692069&quot;&gt;is using&lt;/a&gt; Palantir&#39;s software for supply chain management and anticipating/preventing ingredient shortages&lt;/li&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;6 Nov 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Assurance, testing, frameworks, tools&lt;/b&gt;: UK DSIT &lt;a href=&quot;https://www.gov.uk/government/publications/assuring-a-responsible-future-for-ai&quot;&gt;report&lt;/a&gt;&amp;nbsp;&quot;surveys the state of the UK AI assurance market and sets out how DSIT will drive its future growth&quot; (&lt;a href=&quot;https://www.gov.uk/government/news/ensuring-trust-in-ai-to-unlock-65-billion-over-next-decade&quot;&gt;news release&lt;/a&gt;). Key actions planned:&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Developing an &lt;a href=&quot;https://www.gov.uk/government/publications/introduction-to-ai-assurance/introduction-to-ai-assurance&quot;&gt;AI assurance&lt;/a&gt; platform&lt;b&gt;&amp;nbsp;&lt;/b&gt;as a one-stop shop for developers/deployers, &quot;bringing together existing assurance tools, services, frameworks and practices together in one place&quot; including DSIT guidance/tools/resources, including an AI Essentials toolkit which, like the UK Cyber Essentials, will &quot;distil key tenets of relevant governance frameworks and standards to make these comprehensible for industry&quot;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;The first tool was an &lt;a href=&quot;https://www.gov.uk/government/consultations/ai-management-essentials-tool&quot;&gt;AI Management Essentials self-assessment tool&lt;/a&gt;&amp;nbsp;(draft &lt;a href=&quot;https://assets.publishing.service.gov.uk/media/672a5706094e4e60c466d19f/AI_Management_Essentials_tool_Self-Assessment.pdf&quot;&gt;tool&lt;/a&gt;, &lt;a href=&quot;https://www.gov.uk/government/consultations/ai-management-essentials-tool/guidance-for-using-the-ai-management-essentials-tool&quot;&gt;guidance&lt;/a&gt;) drawing on key principles from existing standards/frameworks including ISO/IEC 42001 (on AI management), the EU AI Act, and the NIST AI Risk Management Framework, to provide &quot;a simple, free baseline of organisational good practice, supporting private sector organisations to engage in the development of ethical, robust and responsible AI&quot;. The &lt;a href=&quot;https://dsit.qualtrics.com/jfe/form/SV_cYXmLLovHHNMJWS&quot;&gt;consultation&lt;/a&gt; on this tool closes on &lt;i&gt;25 Jan 25&lt;/i&gt;.&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;Developing, with industry, a roadmap to trusted third-party AI assurance to increase the supply of independent, high-quality, trusted assurance&lt;/li&gt;&lt;li&gt;Collaborating with the UK Artificial Intelligence Safety Institute (AISI)&amp;nbsp;to advance assurance research, development and adoption like new techniques for evaluating and assuring AI systems to ensure safe and responsible development/deployment. This includes:&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Exploring how Privacy Enhancing Technologies (PETs) can enable data sharing with researchers to&amp;nbsp;help them understand the capabilities and controllability of models while&amp;nbsp;minimising risks to privacy or commercial confidentiality&lt;/li&gt;&lt;li&gt;Enabling/promoting the interoperability of AI assurance across jurisdictions internationally&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;Developing a Terminology Tool for Responsible AI, to define key terminology used in the UK and other jurisdictions and the relationships between them, to help industry and assurance service providers navigate key concepts and terms in different AI governance frameworks &quot;to communicate effectively with consumers and trading partners within the UK and other jurisdictions, supporting the growth of the UK’s AI assurance market&quot;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Work has already started on this with the US&amp;nbsp;National Institute for Standards and Technology (NIST) and the UK’s National Physical Laboratory (NPL)&lt;/li&gt;&lt;li&gt;Sector-specific non-technical guidance on assurance good practice: already produced for employment (&lt;a href=&quot;https://www.gov.uk/government/publications/responsible-ai-in-recruitment-guide&quot;&gt;procuring and deploying AI for recruitment&lt;/a&gt;: see also below on ICO questions); guidance for other sectors including financial services to be published &quot;in the near future&quot;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;Employment, recruitment, data protection&lt;/b&gt;: UK ICO&#39;s &lt;a href=&quot;https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/11/thinking-of-using-ai-to-assist-recruitment-our-key-data-protection-considerations/&quot;&gt;key data protection questions&lt;/a&gt; when procuring AI tools to help with recruitment (DPIA, lawful basis, documented responsibilities and clear processing instructions, bias mitigation, transparency re use, limiting unnecessary processing): ICO &lt;a href=&quot;https://ico.org.uk/about-the-ico/media-centre/events-and-webinars/webinar-on-the-use-of-ai-tools-in-recruitment/?id=I5MSUKuPAECtwcTP6_oh5huh8GucSN1GgLUFzaIcwGRUMTZUM1lGUzUyQTlLWkZWQ0tNNVZLVDRIMi4u&quot;&gt;webinar&lt;/a&gt;&amp;nbsp;10 am, 22 Jan 25. Also see above on DSIT guidance&lt;/li&gt;&lt;li&gt;&lt;b&gt;EU AI Act&lt;/b&gt;: &lt;a href=&quot;https://www.edpb.europa.eu/system/files/2024-11/edpb-reply-to-the-letter-from-the-ai-office_en.pdf&quot;&gt;EDPB letter&lt;/a&gt; to European Commission on role of data protection authorities&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;5 Nov 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;AI usage, chatbots, LLMs&lt;/b&gt;: the UK government&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/government/news/governments-experimental-ai-chatbot-to-help-people-set-up-small-businesses-and-find-support&quot;&gt;released its experimental AI chatbot&lt;/a&gt;&amp;nbsp;to help people set up small businesses and find support&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;EU&lt;/b&gt;: the Council &lt;a href=&quot;https://www.consilium.europa.eu/en/press/press-releases/2024/11/05/artificial-intelligence-ai-council-approves-conclusions-to-strengthen-eu-s-ambitions/&quot;&gt;approved&lt;/a&gt; conclusions on the &lt;a href=&quot;https://www.eca.europa.eu/en/publications/sr-2024-08&quot;&gt;European Court of Auditors&#39; (ECA) report&lt;/a&gt; on strengthening EU &quot;AI ambitions, notably by enhancing governance and ensuring an increased, more focused investment when moving forward in this field&quot;, including scaling up AI investments and facilitating access to digital infrastructure, noting the importance of AI systems&#39; environmental impact, high-performance computing, possible solutions to increase energy efficiency, and securing a reliable hardware supply chain&lt;/li&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;4 Nov 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Models, open source&lt;/b&gt;: Epoch AI&#39;s &lt;a href=&quot;https://epoch.ai/blog/open-models-report&quot;&gt;report&lt;/a&gt; comparing open and closed models: &quot;The best open model today is on par with closed models in performance and training compute, but with a lag of about one year&quot;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;1 Nov 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Gen AI, risks, management&lt;/b&gt;: Open Loop &amp;amp; Meta &lt;a href=&quot;https://openloop.org/reports/2024/10/report-2-nist-generative-ai-profile.pdf&quot;&gt;report&lt;/a&gt;, Generative AI Risk Management and the NIST Generative AI Profile (NIST AI 600-1)&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;On-device, LLMs&lt;/b&gt;: Apple &lt;a href=&quot;https://machinelearning.apple.com/research/core-ml-on-device-llama&quot;&gt;explained&lt;/a&gt; &quot;how to optimize and deploy an LLM to Apple silicon, achieving the performance required for real time use cases&quot;, using Meta&#39;s Llama-3.1-8B-Instruct, &quot;a popular mid-size LLM&quot;, showing &quot;how using Apple’s Core ML framework and the optimizations described here, this model can be run locally on a Mac with M1 Max with about ~33 tokens/s decoding speed&quot;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;30 Oct 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Metrics, hallucinations&lt;/b&gt;: OpenAI &lt;a href=&quot;https://openai.com/index/introducing-simpleqa/&quot;&gt;announced&lt;/a&gt; its new &lt;a href=&quot;https://github.com/openai/simple-evals/&quot;&gt;open source SimpleQA benchmark&lt;/a&gt; that measures LMs&#39; &quot;ability to answer short, fact-seeking questions&quot;&lt;/li&gt;&lt;li&gt;&lt;b&gt;US EO14110&lt;/b&gt;: US DoC &lt;a href=&quot;https://www.whitehouse.gov/briefing-room/statements-releases/2024/10/30/fact-sheet-key-ai-accomplishments-in-the-year-since-the-biden-harris-administrations-landmark-executive-order/&quot;&gt;fact sheet&lt;/a&gt; on key accomplishments 1 year on from this Biden-Harris EO&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Note: reportedly the new Trump government is likely to get get rid of EO14110&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;29 Oct 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Employment, recruitment&lt;/b&gt;: LinkedIn &lt;a href=&quot;https://www.linkedin.com/business/talent/blog/talent-acquisition/introducing-hiring-assistant&quot;&gt;introduced&lt;/a&gt; an AI-powered &quot;&lt;a href=&quot;https://business.linkedin.com/talent-solutions/hiring-assistant&quot;&gt;Hiring Assistant&lt;/a&gt; to Help Recruiters Spend More Time On Their Most Impactful Work&quot;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;28 Oct 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Cybersecurity, LLMs, open source, tools&lt;/b&gt;: paper&amp;nbsp;&lt;a href=&quot;https://arxiv.org/abs/2410.20911&quot;&gt;Hacking Back the AI-Hacker: Prompt Injection as a Defense Against LLM-driven Cyberattacks&lt;/a&gt;. &quot;...We introduce Mantis, a defensive framework that exploits LLMs&#39; susceptibility to adversarial inputs to undermine malicious operations. Upon detecting an automated cyberattack, Mantis &lt;i&gt;plants carefully crafted inputs into system responses&lt;/i&gt;, leading the attacker&#39;s LLM to disrupt their own operations (passive defense) or even compromise the attacker&#39;s machine (active defense). By deploying purposefully vulnerable decoy services to attract the attacker and using dynamic prompt injections for the attacker&#39;s LLM, Mantis can autonomously hack back the attacker&quot;. &lt;a href=&quot;https://github.com/pasquini-dario/project_mantis&quot;&gt;Code&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Data scraping, training data&lt;/b&gt;: following industry engagement, global privacy authorities &lt;a href=&quot;https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/10/global-privacy-authorities-issue-follow-up-joint-statement-on-data-scraping-after-industry-engagement/&quot;&gt;issued&lt;/a&gt;&amp;nbsp;their&amp;nbsp;&lt;a href=&quot;https://www.priv.gc.ca/en/opc-news/speeches-and-statements/2024/js-dc_20241028/&quot;&gt;Concluding joint statement on data scraping and the protection of privacy&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Facial recognition, data protection&lt;/b&gt;: the UK ICO &lt;a href=&quot;https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/11/information-commissioner-seeks-permission-to-appeal-clearview-ai-inc-ruling/#:~:text=Update%20Monday%2028%20October%202024%3A&quot;&gt;applied&lt;/a&gt;&amp;nbsp;for permission to appeal the &lt;a href=&quot;https://assets.caselaw.nationalarchives.gov.uk/ukftt/grc/2023/819/ukftt_grc_2023_819.pdf&quot;&gt;First-tier Tribunal&#39;s judgment on Clearview AI&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Intellectual property, competition, training&lt;/b&gt;: UK Prime Minister Keir Starmer&#39;s &lt;a href=&quot;https://www.theguardian.com/commentisfree/2024/oct/28/keir-starmer-journalism-lifeblood-british-democracy-labour&quot;&gt;article&lt;/a&gt;&amp;nbsp;includes: &quot;Both artificial intelligence and the &lt;i&gt;creative industries – which include news media&lt;/i&gt; – are central to this government’s driving mission on economic growth. To strike balance in our industrial policy, we are working closely with these sectors. &lt;i&gt;We recognise the basic principle that publishers should have control over and seek payment for their work, including when thinking about the role of AI&lt;/i&gt;. Not only is it essential for a vibrant media landscape, in which the sector’s provision of trustworthy information is more vital than ever, it is also relevant to our &lt;i&gt;ongoing work to roll out the Digital Markets, Competition and Consumers Act&lt;/i&gt; as swiftly as possible. This landmark legislation will help rebalance the relationship between online platforms and those, such as publishers, who rely on them.&quot;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Open source AI:&lt;/b&gt;&amp;nbsp;the Open Source Initiative &lt;a href=&quot;https://opensource.org/blog/the-open-source-initiative-announces-the-release-of-the-industrys-first-open-source-ai-definition&quot;&gt;announced&lt;/a&gt; its release of the first &lt;a href=&quot;https://opensource.org/ai/open-source-ai-definition&quot;&gt;Open Source AI Definition&lt;/a&gt; (OSAID) v1.0&lt;/li&gt;&lt;ul&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;Note critiques regarding the description/definition, e.g. security guru Bruce Schneier&#39;s 8 Nov post&amp;nbsp;&lt;a href=&quot;https://www.schneier.com/blog/archives/2024/11/ai-industry-is-trying-to-subvert-the-definition-of-open-source-ai.html&quot;&gt;&quot;AI Industry is Trying to Subvert the Definition of “Open Source AI”&lt;/a&gt;&amp;nbsp;suggesting that the description should be &quot;open weights&quot;, not &quot;open source&quot;&lt;/li&gt;&lt;/ul&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;OSs, mobile&lt;/b&gt;: Apple&amp;nbsp;&lt;a href=&quot;https://www.apple.com/newsroom/2024/10/apple-intelligence-is-available-today-on-iphone-ipad-and-mac/https://www.apple.com/newsroom/2024/10/apple-intelligence-is-available-today-on-iphone-ipad-and-mac/&quot;&gt;released&lt;/a&gt;&amp;nbsp;its Apple Intelligence AI capabilities for iPhone, iPad, Mac&amp;nbsp;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Sustainability, US, water, data centers&lt;/b&gt;:&amp;nbsp;J.P. Morgan and ERM &lt;a href=&quot;https://www.erm.com/insights/the-future-of-water-resilience-in-the-us/&quot;&gt;report&lt;/a&gt; on&amp;nbsp;water resilience in the US. Water is of course needed for cooling in data centers, which are increasingly being built for AI processing&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;25 Oct 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;AI usage, saving lives&lt;/b&gt;: UK &lt;a href=&quot;https://www.gov.uk/government/case-studies/wave-of-the-future-how-dasa-backed-ai-innovation-is-revolutionising-maritime-rescue&quot;&gt;announcement&lt;/a&gt; that&amp;nbsp;Scotland-based SME Zelim (which benefited from DASA funding) had won a contract with the US Navy to deploy their innovative AI-enabled Person-in-Water detection and tracking technology ZOE. &quot;Zelim’s detection and tracking system uses AI to scan the water surface to find people in the water much more accurately and consistently than human eyes and current systems can. Low-cost and easy to integrate, the software solution can be implemented in any camera or CCTV setup&quot;&lt;/li&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;24 Oct 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;EU AI Act standards, intellectual property&lt;/b&gt;: &lt;a href=&quot;https://publications.jrc.ec.europa.eu/repository/handle/JRC139430&quot;&gt;Commission note&lt;/a&gt; on&amp;nbsp;some of the key characteristics expected from upcoming standards&amp;nbsp;for high-risk AI systems to support implementation of the AI Act (&lt;a href=&quot;https://ai-watch.ec.europa.eu/news/harmonised-standards-european-ai-act-2024-10-25_en&quot;&gt;news article&lt;/a&gt;)&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Note: the Commission &lt;a href=&quot;https://ec.europa.eu/transparency/documents-register/detail?ref=C(2023)3215&amp;amp;lang=en&quot;&gt;previously requested&lt;/a&gt; EU standardisation organisations, led by CEN-CENELEC, to draft various standards for the AI Act, to &lt;a href=&quot;https://ec.europa.eu/transparency/documents-register/api/files/C(2023)3215_1/de00000001048943?rendition=false&quot;&gt;cover&lt;/a&gt;: risk management systems, governance and quality of datasets used to
build AI systems, record keeping through logging capabilities, transparency
and information provisions for users, human oversight, accuracy specifications, robustness specifications, cybersecurity specifications, quality management
systems for providers including post-market monitoring processes,
conformity assessment.&lt;/li&gt;&lt;li&gt;In&amp;nbsp;&lt;a href=&quot;https://curia.europa.eu/juris/document/document.jsf?text=&amp;amp;docid=283443&amp;amp;pageIndex=0&amp;amp;doclang=en&quot;&gt;Case C-588/21P&lt;/a&gt;&amp;nbsp;the CJEU stated that, while harmonised standards under&amp;nbsp;Regulation 1049/2001 were protected by copyright, as CEN-CENELEC &lt;a href=&quot;https://www.cencenelec.eu/news-and-events/news/2024/brief-news/2024-03-05-ecj-case/https://www.cencenelec.eu/news-and-events/news/2024/brief-news/2024-03-05-ecj-case/&quot;&gt;acknowledged&lt;/a&gt;, there was an overriding public interest in their disclosure, and annulled the Commission&#39;s refusal of access to those standards. So the new standards for high-risk AI should be publicly-available.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;AI edits, transparency&lt;/b&gt;: Google &lt;a href=&quot;https://blog.google/products/photos/ai-editing-transparency/&quot;&gt;is&lt;/a&gt; indicating when an image in Google Photos has been edited using Google&#39;s genAI (e.g. Magic Editor, Magic Eraser and Zoom Enhance), &lt;i&gt;and &lt;/i&gt;using The International Press Telecommunications Council (IPTC) metadata to indicate when an image comprises elements from different photos using &lt;i&gt;non&lt;/i&gt;-generative features&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Health, life expectancy&lt;/b&gt;: UK NHS trials AI &quot;&lt;a href=&quot;https://www.express.co.uk/news/science/1966645/nhs-trials-superhuman-artificial-intelligence&quot;&gt;that predicts when patients will die&lt;/a&gt;&quot;&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;On-device ML, homomorphic encryption, PETs&lt;/b&gt;: Apple &lt;a href=&quot;https://machinelearning.apple.com/research/homomorphic-encryption&quot;&gt;is combining&lt;/a&gt; machine learning and HE in its ecosystem for privacy while enriching on-device experiences with information privately retrieved from server databases&amp;nbsp;&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Testing, cybersecurity, tools&lt;/b&gt;: Google &lt;a href=&quot;https://blog.google/technology/safety-security/google-ai-saif-risk-assessment/&quot;&gt;released&lt;/a&gt; its &lt;a href=&quot;https://saif.google/risk-self-assessment&quot;&gt;Secure AI Framework (SAIF) risk assessment&lt;/a&gt; tool &quot;that can help others assess their security posture, apply these best practices and put SAIF principles into action&quot;. It&#39;s a questionnaire-based tool &quot;that will generate an instant and tailored checklist to guide practitioners to secure their AI systems&quot;&lt;/li&gt;
&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Testing, assurance, safety&lt;/b&gt;: by the UK Artificial Intelligence Safety Institute (AISI), &lt;a href=&quot;https://www.aisi.gov.uk/work/early-lessons-from-evaluating-frontier-ai-systems&quot;&gt;Early lessons from evaluating frontier AI systems&lt;/a&gt;, discussing the evolving role of third-party evaluators in assessing AI safety, and how to design robust, impactful testing frameworks.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;23 Oct 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;GenAI, synthetic data, identification&lt;/b&gt;: article by Google DeepMind researchers&amp;nbsp;&lt;a href=&quot;https://www.nature.com/articles/s41586-024-08025-4&quot;&gt;Scalable watermarking for identifying large language model outputs&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;GenAI, risks, management&lt;/b&gt;: &lt;a href=&quot;https://www.gao.gov/products/gao-25-107651&quot;&gt;Generative AI Training, Development, and Deployment Considerations&lt;/a&gt;, by the US Government Accountability Office (GAO)&lt;/li&gt;&lt;li&gt;&lt;b&gt;Work, employment&lt;/b&gt;: &lt;a href=&quot;https://www.bbc.co.uk/news/articles/c93pz1dz2kxo&quot;&gt;will AI make work burnout worse?&lt;/a&gt;&amp;nbsp;One small PR agency&#39;s experiences with ChatGPT&#39;s impact on employee productivity: &quot;Staff reported that tasks were in fact taking longer as they had to create a brief and prompts for ChatGPT, while also having to double check its output for inaccuracies, of which there were many. And every time the platform was updated, they had to learn its new features, which also took extra time&quot;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;22 Oct 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Agents, computer control&lt;/b&gt;: Anthropic&amp;nbsp;&lt;a href=&quot;https://www.anthropic.com/news/3-5-models-and-computer-use&quot;&gt;announced&lt;/a&gt;&amp;nbsp;that its experimental Claude 3.5 Sonnet model can (as a beta feature) &lt;a href=&quot;https://docs.anthropic.com/en/docs/build-with-claude/computer-use&quot;&gt;interact with&lt;/a&gt; tools to manipulate a computer desktop environment, to &quot;use computers the way people do—by looking at a screen, moving a cursor, clicking buttons, and typing text&quot; (see also 19 Nov)&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Intellectual property, genAI, training&lt;/b&gt;: a statement on AI training &quot;The unlicensed use of creative works for training generative AI is a major, unjust threat to the livelihoods of the people behind those works, and must not be permitted&quot; was &lt;a href=&quot;https://www.aitrainingstatement.org/&quot;&gt;released&lt;/a&gt;. To date it&#39;s been signed by over 39.5k (and counting): musicians, writers, industry organisations and others including many famous names&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;21 Oct 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Detection, genAI, synthetic data&lt;/b&gt;: &lt;a href=&quot;https://boingboing.net/2024/10/21/students-fight-false-accusations-from-ai-detection-snake-oil.html&quot;&gt;good roundup&lt;/a&gt; of recently-reported errors made by claimed AI-detecting tools (no doubt many also using AI), falsely accusing students of plagiarism&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Open source, LLMs:&lt;/b&gt;&amp;nbsp;IBM &lt;a href=&quot;https://newsroom.ibm.com/2024-10-21-ibm-introduces-granite-3-0-high-performing-ai-models-built-for-business&quot;&gt;released&lt;/a&gt;&amp;nbsp;its open source Granite 3.0 models &quot;High Performing AI Models Built for Business&quot;, and also announced its next generation of Granite-powered watsonx Code Assistant for general purpose coding, and new tools in watsonx.ai for building and deploying AI applications and agents&lt;/li&gt;&lt;li style=&quot;margin-top: -0.2em;&quot;&gt;&lt;b&gt;Transparency&lt;/b&gt;: &lt;a href=&quot;https://www.drcf.org.uk/publications/blogs/ai-transparency-drcf-perspectives/&quot;&gt;summary&lt;/a&gt; of findings from a UK&amp;nbsp;Digital Regulation Cooperation Forum (DRCF)&amp;nbsp;workshop in Aug 2024 on why AI transparency is important, key considerations for participating regulators, and useful information from each regulator on existing guidance and their next steps related to AI transparency&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;18 Oct 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Multimodal, open source, LLMs&lt;/b&gt;: Meta announced&amp;nbsp;&lt;a href=&quot;https://speechbot.github.io/spiritlm/&quot;&gt;Spirit LM&lt;/a&gt;, its open source language modal that mixs both text and speech audio. Paper &lt;a href=&quot;https://arxiv.org/pdf/2402.05755&quot;&gt;SPIRIT LM: Interleaved Spoken and Written Language Model&lt;/a&gt; (&lt;a href=&quot;https://venturebeat.com/ai/meta-introduces-spirit-lm-open-source-model-that-combines-text-and-speech-inputs-outputs/?utm_source=tldrai&quot;&gt;VB article&lt;/a&gt;)&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;17 Oct 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Physical world, sensor data&lt;/b&gt;:&amp;nbsp;&lt;a href=&quot;https://www.archetypeai.io/blog/can-ai-learn-physics-from-sensor-data&quot;&gt;Can AI Learn Physics from Sensor Data?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;16 Oct 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Employment, recruitment, bias, ethnicity&lt;/b&gt;: &lt;a href=&quot;https://ojs.aaai.org/index.php/AIES/article/view/31748&quot;&gt;paper&lt;/a&gt;&amp;nbsp;on using LLMs for resume / CV screening,&amp;nbsp;Gender, Race, and Intersectional Bias in Resume Screening via Language Model Retrieval which tested whether various Massive Text Embedding (MTE) models are biased (bias regarding &lt;i&gt;intersectionality &lt;/i&gt;involves intersecting attributes like gender and ethnicity). &quot;We simulate this for nine occupations, using a collection of over 500 publicly available resumes and 500 job descriptions. We find that the MTEs are biased, significantly favoring White-associated names in 85.1% of cases and female-associated names in only 11.1% of cases, with a minority of cases showing no statistically significant differences. Further analyses show that Black males are disadvantaged in up to 100% of cases...&amp;nbsp;We also find an impact of document length as well as the corpus frequency of names in the selection of resumes [such that increasing the ratio of signals that are &lt;i&gt;proxies&lt;/i&gt; to race or gender information in a document by decreasing its length can increase the number of biased outcomes by 22.2%, and changing frequency matching strategies can alter whether Black names or White names are favored in a majority of cases]. These findings have implications for widely used AI tools that are automating employment, fairness, and tech policy&quot;&lt;/li&gt;&lt;li&gt;&lt;b&gt;EU AI Act, compliance, tools&lt;/b&gt;: Reuters &lt;a href=&quot;https://www.reuters.com/technology/artificial-intelligence/eu-ai-act-checker-reveals-big-techs-compliance-pitfalls-2024-10-16/&quot;&gt;reported&lt;/a&gt; on a &lt;a href=&quot;https://compl-ai.org/&quot;&gt;new tool&lt;/a&gt;&amp;nbsp;that &quot;awards AI models a score between 0 and 1 across dozens of categories, including technical robustness and safety&quot;&amp;nbsp;with a leaderboard published of various models developed by big tech companies, and a&amp;nbsp;&quot;Large Language Model (LLM) Checker&quot;. &lt;a href=&quot;https://compl-ai.org/#evaluate&quot;&gt;According to&lt;/a&gt; the website, models can be evaluated &lt;i&gt;locally&lt;/i&gt; and the JSON report file uploaded for a technical report.&amp;nbsp;The tool provider states, &quot;We have interpreted the high-level regulatory requirements of the EU AI Act as concrete technical requirements. We further group requirements within six EU AI Act principles and label them as GPAI, GPAI+SR (Systemic Risk), and HR (High-Risk)&quot; (&lt;a href=&quot;https://arxiv.org/abs/2410.07959&quot;&gt;paper&lt;/a&gt; - on my &quot;to read&quot; list!). The technical aspects the tool &lt;a href=&quot;https://compl-ai.org/interpretation&quot;&gt;seeks to evaluate&lt;/a&gt;&amp;nbsp;are:&amp;nbsp;Robustness and Predictability, Cyberattack resilience (cybersecurity), Training Data Suitability, No Copyright Infringement, User Privacy Protection,&amp;nbsp;Capabilities, Performance, and Limitations,&amp;nbsp;Interpretability,&amp;nbsp;Disclosure of AI (transparency), Traceability, Explainability, Risks, Evaluations,&amp;nbsp;Representation — Absence of Bias,&amp;nbsp;Fairness — Absence of Discrimination, Harmful Content and Toxicity&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;Early Oct 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;LLMs, hallucinations&lt;/b&gt;: much ado (e.g. &lt;a href=&quot;https://medium.com/@ignacio.de.gregorio.noblejas/entropy-finally-a-real-cure-to-hallucinations-52d63c23c2f5&quot;&gt;good article&lt;/a&gt;) about the&amp;nbsp;&lt;a href=&quot;https://github.com/xjdr-alt/entropix/tree/main&quot;&gt;Entropix&lt;/a&gt;&amp;nbsp;project, on using uncertainty modelling to reduce LLM hallucinations&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;10 Oct 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Roundup&lt;/b&gt;: excellent &lt;a href=&quot;https://www.stateof.ai/2024-report-launch&quot;&gt;State of AI report 2024&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;7 Oct 24&lt;/p&gt;
&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;LLMs, maths reasoning&lt;/b&gt;: paper by Apple researchers on limitations&amp;nbsp;&lt;a href=&quot;https://arxiv.org/abs/2410.05229&quot;&gt;GSM-Symbolic: Understanding the Limitations of Mathematical Reasoning in Large Language Models&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://www.wired.com/story/apple-ai-llm-reasoning-research/&quot;&gt;Wired article&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;7 Oct 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;GenAI, transparency&lt;/b&gt;: Google &lt;a href=&quot;https://blog.google/technology/ai/google-gen-ai-content-transparency-c2pa/&quot;&gt;joined&lt;/a&gt; the Coalition for Content Provenance and Authenticity (C2PA) as a steering committee member, and is incorporating C2PA&#39;s standard into its products&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;And just a few from before Oct 2024...&lt;/p&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;27 Sept 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Employment, recruitment&lt;/b&gt;: half of a tech company&#39;s HR department&amp;nbsp;&lt;a href=&quot;https://www.ibtimes.co.uk/lazy-mediocre-hr-team-fired-after-managers-own-cv-gets-auto-rejected-seconds-exposing-system-1727202&quot;&gt;was fired&lt;/a&gt; after their manager found their an application review system (not necessarily AI?) auto-rejected &lt;i&gt;all &lt;/i&gt;applications, even the manager&#39;s own CV submitted under a fake name! &quot;...HR had set up the system to search for developers with expertise in the wrong development software and one that no longer exists...&quot; but also &quot;[HR] always told [the manager] that they had some candidates that didn&#39;t pass the first screening processes (which was false)&quot;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;25 Sept 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Misrepresentation&lt;/b&gt;: the US FTC &lt;a href=&quot;https://www.ftc.gov/news-events/news/press-releases/2024/09/ftc-announces-crackdown-deceptive-ai-claims-schemes&quot;&gt;announced&lt;/a&gt;&amp;nbsp;5 law enforcement actions &quot;against operations that use AI hype or sell AI technology that can be used in deceptive and unfair ways&quot;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;24 Sept 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Financial services, Canada, usage, risks, management&lt;/b&gt;: by the Office of the Superintendent of Financial Institutions (OSFI) and the Financial Consumer Agency of Canada (FCAC),&amp;nbsp;&lt;a href=&quot;https://www.osfi-bsif.gc.ca/en/about-osfi/reports-publications/osfi-fcac-risk-report-ai-uses-risks-federally-regulated-financial-institutions&quot;&gt;OSFI-FCAC Risk Report - AI Uses and Risks at Federally Regulated Financial Institutions&lt;/a&gt;&amp;nbsp;outlines key risks (from internal AI adoption or from AI use by external actors) that arise for financial institutions from AI, supported by findings from a previous questionnaire and insights from external publications. &quot;It also presents certain practices that can help mitigate some of the risks. These are not meant to serve as guidance but can be positive steps in a financial institution&#39;s journey to manage the risks related to AI&quot;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;display: inline; margin: 0px; padding: 0px; text-align: left;&quot;&gt;23 Sept 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;Testing&lt;/b&gt;: from the UK AISI, &lt;a href=&quot;https://www.aisi.gov.uk/work/early-insights-from-developing-question-answer-evaluations-for-frontier-ai&quot;&gt;Early Insights from Developing Question-Answer Evaluations for Frontier AI&lt;/a&gt;. &quot;A common technique for quickly assessing AI capabilities is prompting models to answer hundreds of questions, then automatically scoring the answers. We share insights from months of using this method&quot;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;margin: 0px; padding: 0px;&quot;&gt;18 Sept 24&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;&lt;b&gt;GenAI, health, misrepresentation, accuracy&lt;/b&gt;: Texas AG &lt;a href=&quot;https://www.texasattorneygeneral.gov/news/releases/attorney-general-ken-paxton-reaches-settlement-first-its-kind-healthcare-generative-ai-investigation&quot;&gt;settlement&lt;/a&gt; with a Dallas-based artificial intelligence healthcare technology company, resolving allegations that it deployed its products at several Texas hospitals after making false and misleading statements about the &lt;i&gt;accuracy and safety &lt;/i&gt;of its products. At least four major Texas hospitals provided their patients’ healthcare data in real time for the generative AI product to “summarize” patients’ condition and treatment for hospital staff. The AG investigation found deceptive claims about the accuracy of its healthcare AI products, putting the public interest at risk; metrics used to claim accuracy, including advertising and marketing the accuracy of its products and services by claiming an error rate or “severe hallucination rate” of&amp;nbsp; “&amp;lt;1 per 100,000”, were found likely inaccurate &quot;and may have deceived hospitals about the accuracy and safety of the company’s products&quot;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;display: inline; margin: 0px; padding: 0px; text-align: left;&quot;&gt;Older, but just because I think these are interesting!&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;EU AI Act, law enforcement&lt;/b&gt;: in Jul 2024, various EU Member States &lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-12603-2024-INIT/x/pdf&quot;&gt;submitted queries&lt;/a&gt; to the Commission on the AI Act. Some related to definitions/concepts more broadly, not just in the crime/justice context. It would be good to know the answers!&lt;/li&gt;&lt;li&gt;&lt;b&gt;Workplace, jobs&lt;/b&gt;: a 2023 &lt;a href=&quot;https://www.challengergray.com/blog/may-2023-ceo-turnover-report-ceos-leave-at-highest-monthly-rate-on-record/#:~:text=replaced%20by%20artificial%20intelligence&quot;&gt;report&lt;/a&gt;&amp;nbsp;by Challenger, Gray noted that a CEO of an unnamed company [maybe Dictador, see below?] was &quot;replaced by artificial intelligence... China-based gaming company NetDragon Websoft appointed an AI robot it calls Tang Yu as its CEO last August [i.e. 2022]. Legal software company Logikcull CEO and co-founder Andy Wilson has said he will replace himself with an AI bot named Andy Woofson by 2024&quot;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;In fact Logikcull was &lt;a href=&quot;https://www.revealdata.com/news/logikcull-ipro-acquisition&quot;&gt;acquired&lt;/a&gt; in Aug 23 so that never happened...&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.yahoo.com/tech/humanoid-robot-ceo-drinks-company-101055228.html&quot;&gt;Reportedly&lt;/a&gt; Polish drinks company Dictador appointed an AI-powered humanoid robot named Mika as its experimental CEO in 2023 (&lt;a href=&quot;https://www.youtube.com/watch?v=d5mpwNgyoms&quot;&gt;video interview&lt;/a&gt;)&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;AI usage&lt;/b&gt;: in 2021, NotCo &lt;a href=&quot;https://www.businesswire.com/news/home/20211221005586/en/NotCo-Ushers-in-a-New-Golden-Era-of-Chicken-with-the-Launch-of-NotChicken%E2%84%A2&quot;&gt;launched&lt;/a&gt; 4 plant-based chicken varieties in Latin America. &quot;NotCo utilizes a proprietary artificial intelligence technology, Giuseppe, which matches animal proteins to their ideal replacements among thousands of plant-based ingredients&quot;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;margin-top: -0.2em; text-align: left;&quot;&gt;
&lt;/ul&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/4126456959904483371'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/4126456959904483371'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2025/01/things-ai-q4-2024.html' title='Things AI, Q4 2024'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-6357969043048423771</id><published>2025-01-10T17:13:00.002+00:00</published><updated>2025-01-10T17:13:12.909+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AI"/><category scheme="http://www.blogger.com/atom/ns#" term="AI liability"/><category scheme="http://www.blogger.com/atom/ns#" term="AI Liability Directive"/><category scheme="http://www.blogger.com/atom/ns#" term="eu"/><title type='text'>Proposed EU AI Liability Directive</title><content type='html'>&lt;p&gt;Some recent links on the progress with this proposed EU Directive&lt;/p&gt;&lt;ul style=&quot;margin-top: -0.2em;&quot;&gt;&lt;li&gt;30 Oct 24 certain&amp;nbsp;&lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-14641-2024-REV-1/en/pdf&quot;&gt;Member States&#39; comments&lt;/a&gt;&amp;nbsp;on the proposal&lt;/li&gt;&lt;li&gt;25 Oct 24 Council Presidency&amp;nbsp;&lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-14572-2024-INIT/en/pdf&quot;&gt;discussion paper&lt;/a&gt;&amp;nbsp;on the proposal&lt;/li&gt;&lt;li&gt;19 Sept 24&amp;nbsp;&lt;a href=&quot;https://www.europarl.europa.eu/RegData/etudes/STUD/2024/762861/EPRS_STU(2024)762861_EN.pdf&quot;&gt;Proposal for a directive on adapting non-contractual civil liability rules to artificial intelligence - complementary impact assessment&lt;/a&gt;&amp;nbsp;by European Parliamentary Research Service (EPRS) for the European Parliament.&amp;nbsp;Proposed that the AILD should extend its scope to include general-purpose and other &#39;high-impact AI systems&#39;, aswell as software. Discussed a mixed liability framework that balances fault-based and strict liability, recommending &quot;transitioning from an AI-focused directive to a software liability regulation, to prevent market fragmentation and enhance clarity across the EU&quot;&lt;/li&gt;&lt;/ul&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/6357969043048423771'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/6357969043048423771'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2025/01/proposed-eu-ai-liability-directive.html' title='Proposed EU AI Liability Directive'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-1741203701488045562</id><published>2024-11-18T08:03:00.007+00:00</published><updated>2024-11-19T15:15:59.665+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AI"/><category scheme="http://www.blogger.com/atom/ns#" term="AI supply chain"/><category scheme="http://www.blogger.com/atom/ns#" term="AI value chain"/><category scheme="http://www.blogger.com/atom/ns#" term="artificial intelligence"/><category scheme="http://www.blogger.com/atom/ns#" term="bias"/><category scheme="http://www.blogger.com/atom/ns#" term="cloud"/><category scheme="http://www.blogger.com/atom/ns#" term="data protection"/><category scheme="http://www.blogger.com/atom/ns#" term="discrimination"/><category scheme="http://www.blogger.com/atom/ns#" term="fairness"/><category scheme="http://www.blogger.com/atom/ns#" term="GDPR"/><category scheme="http://www.blogger.com/atom/ns#" term="large language models"/><category scheme="http://www.blogger.com/atom/ns#" term="legitimate interests"/><category scheme="http://www.blogger.com/atom/ns#" term="LLMs"/><category scheme="http://www.blogger.com/atom/ns#" term="machine learning"/><category scheme="http://www.blogger.com/atom/ns#" term="ML"/><category scheme="http://www.blogger.com/atom/ns#" term="privacy"/><category scheme="http://www.blogger.com/atom/ns#" term="training"/><title type='text'>AI: legitimate interests, controller/processor questions - data protection/privacy</title><content type='html'>&lt;p&gt;Under GDPR, can personal data be processed based on &lt;b&gt;legitimate interests&lt;/b&gt; for &lt;b&gt;AI-related &lt;/b&gt;purposes, whether for training, deployment, or beyond? That was the key focus of the &lt;a href=&quot;https://www.edpb.europa.eu/news/news/2024/edpb-stakeholder-event-ai-models_en&quot;&gt;EDPB stakeholder event on AI models&lt;/a&gt;&amp;nbsp;on 5 Nov 24 that I was &lt;a href=&quot;https://www.edpb.europa.eu/news/news/2024/stakeholder-event-ai-models-express-your-interest-participate_en&quot;&gt;registered&lt;/a&gt; to &lt;a href=&quot;https://www.edpb.europa.eu/news/news/2024/join-stakeholder-event-edpb-opinion-ai-models_en&quot;&gt;attend&lt;/a&gt;&amp;nbsp;and was fortunate enough to get a place - many thanks to the EDPB for holding this event!&lt;/p&gt;&lt;p&gt;The event was intended to gather cross-stakeholder&amp;nbsp;views to inform the EDPB&#39;s drafting of an&amp;nbsp;&lt;a href=&quot;https://www.gdprinfo.info/#a64.2&quot;&gt;Art.64(2)&lt;/a&gt;&amp;nbsp;&lt;b&gt;consistency opinion on AI models&lt;/b&gt;&amp;nbsp;(defined quite broadly) requested by the&amp;nbsp;&lt;a href=&quot;https://www.dataprotection.ie/en&quot;&gt;Irish DPC&lt;/a&gt;.&amp;nbsp; The EDPB said it will issue this opinion by the&amp;nbsp;&lt;b&gt;end of 2024&lt;/b&gt;&amp;nbsp;but, unlike EDPB guidelines, such consistency opinions&amp;nbsp;&lt;b&gt;&lt;i&gt;can&#39;t&lt;/i&gt;&amp;nbsp;&lt;/b&gt;be updated - which is concerning given how important this area is.&lt;/p&gt;&lt;p&gt;The specific questions were:&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;AI models and &quot;personal data&quot;&lt;/b&gt; - technical ways to evaluate whether an AI model trained using personal data still processes personal data? Any specific tools / methods to assess risks of regurgitation and extraction of personal data from AI models trained using personal data? Which measures (upstream or downstream) can help reduce risks of extracting personal data from such AI models trained using personal data? (including effectiveness, metrics, residual risk)&lt;/li&gt;&lt;li&gt;&lt;b&gt;Can &quot;legitimate interest” be relied on as a lawful basis for processing personal data in AI models?&amp;nbsp;&lt;/b&gt;&lt;/li&gt;&lt;ol&gt;&lt;li&gt;When &lt;b&gt;training &lt;/b&gt;AI models - and what measures to ensure an appropriate balance of interests, considering both first-party and third-party personal data?&lt;/li&gt;&lt;li&gt;In the &lt;b&gt;post-training&lt;/b&gt; phase, like &lt;b&gt;deployment or retraining&lt;/b&gt; - and what measures to ensure an appropriate balance, and what if the competent supervisory authority found the model&#39;s initial training involved unlawful processing?&lt;/li&gt;&lt;/ol&gt;&lt;/ol&gt;&lt;p&gt;There wasn&#39;t enough time for me to explain my planned input properly or to comment on some issues,&amp;nbsp; given the number of attendees, so I am doing it here. I&#39;ll take the second set first.&lt;/p&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;Training AI models - legitimate interests&lt;/h4&gt;
&lt;p&gt;I strongly believe legitimate interest &lt;i&gt;should &lt;/i&gt;be
a valid legal basis for training AI with personal data. Particularly
training AI to reduce the risk of &lt;b&gt;bias or discrimination&lt;/b&gt;
against people, when the AI is used in relation to them.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I had a negative experience with facial biometrics. The UK
Passport Office&#39;s system kept insisting my eyes were shut, when they
were wide open - they&#39;re just small East Asian eyes, white people&#39;s
eyes are usually bigger. Others have suffered far worse from facial
biometrics and facial recognition, including &lt;b&gt;wrongful
arrests, denial of food purchases, debanking&lt;/b&gt; (see &lt;a href=&quot;https://www.kuan0.com/publications.html&quot;&gt;my book&lt;/a&gt;
and 23.5 of the &lt;a href=&quot;https://bit.ly/hontechbookpdf&quot;&gt;free
companion PDF&lt;/a&gt; under Facial recognition).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Had the AI concerned been trained on &lt;b&gt;more, and
enough, non-white faces&lt;/b&gt;, it would be much less likely to
claim facial features that didn&#39;t match typical white facial features
were &quot;inappropriate&quot; (like eye size, hair shape), or to misidentify the
wrong non-white people leading to their wrongful arrests.&lt;/p&gt;
&lt;p&gt;The &lt;a href=&quot;https://bit.ly/eu-aiact&quot;&gt;EU AI Act&lt;/a&gt;&amp;nbsp;is
aware of this risk: &lt;a href=&quot;https://blog.kuan0.com/p/eu-ai-act.html#10.5&quot;&gt;Art.10(5)&lt;/a&gt;&amp;nbsp;(and
see&amp;nbsp;&lt;a href=&quot;https://blog.kuan0.com/p/eu-ai-act.html#r70&quot;&gt;Rec.70&lt;/a&gt;)
specifically &lt;b&gt;&lt;i&gt;permits&lt;/i&gt;&lt;/b&gt; providers
of high-risk AI systems to process &lt;b&gt;special categories&lt;/b&gt;&amp;nbsp;of
personal data, subject to appropriate safeguards and meeting certain
conditions:&lt;/p&gt;
&lt;ol&gt;
  &lt;li&gt;the bias detection and correction cannot be effectively
fulfilled by processing other data, including &lt;b&gt;synthetic or
anonymised data&lt;/b&gt;;&lt;/li&gt;
  &lt;li&gt;the special categories of personal data are subject to &lt;b&gt;technical
limitations on the re-use&lt;/b&gt; of the personal data, and
state-of-the-art &lt;b&gt;security and privacy-preserving measures&lt;/b&gt;,
including &lt;b&gt;pseudonymisation&lt;/b&gt;;&lt;/li&gt;
  &lt;li&gt;the special categories of personal data are subject to
measures to ensure that the personal data processed are &lt;b&gt;secured,
protected&lt;/b&gt;, subject to suitable safeguards, including strict
controls and documentation of the &lt;b&gt;access&lt;/b&gt;, to avoid
misuse and ensure that only authorised persons have access to those
personal data with appropriate &lt;b&gt;confidentiality obligations&lt;/b&gt;;&lt;/li&gt;
  &lt;li&gt;the special categories of personal data are &lt;b&gt;not
to be transmitted, transferred or otherwise accessed &lt;/b&gt;by
other parties;&lt;/li&gt;
  &lt;li&gt;the special categories of personal data are &lt;b&gt;deleted
    &lt;/b&gt;once the bias has been corrected or the personal data has
reached the end of its retention period, whichever comes first;&lt;/li&gt;
  &lt;li&gt;(GDPR) &lt;b&gt;records of processing activities&lt;/b&gt;
include &lt;b&gt;reasons why&lt;/b&gt; processing of special
categories of personal data was strictly necessary to detect and
correct biases, and why that objective could not be achieved by
processing other data.&lt;/li&gt;
&lt;/ol&gt;
&lt;blockquote style=&quot;border: medium none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;
  &lt;div style=&quot;text-align: left;&quot;&gt;(Aside: I know that
Article &lt;b&gt;also&lt;/b&gt; mentions &quot;appropriate safeguards&quot;, but
I&#39;d argue that meeting those conditions would provide the minimum
required safeguards - although in some cases others could be considered
necessary.)&lt;/div&gt;
&lt;/blockquote&gt;
&lt;p&gt;The Act confines this permission to the use of special
category data in high-risk AI systems, but I&#39;d argue that legitimate
interests should permit the use of &lt;b&gt;&lt;i&gt;non&lt;/i&gt;&lt;/b&gt;-special
category personal data through meeting the above conditions (and any
other appropriate safeguards).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Recall that personal data can be processed under
GDPR&#39;s&amp;nbsp;&lt;a href=&quot;https://www.gdprinfo.info/#a6.1.f&quot;&gt;legitimate
interests&lt;/a&gt;&amp;nbsp;legal basis if &quot;necessary for the purposes
of the legitimate interests pursued by the controller&amp;nbsp;&lt;u&gt;or
by a third party&lt;/u&gt;, except where such interests are overridden
by the interests or fundamental rights and freedoms of the data subject
which require protection of personal data, in particular where the data
subject is a child.&quot; The EDPB&#39;s recent &lt;a href=&quot;https://www.edpb.europa.eu/system/files/2024-10/edpb_guidelines_202401_legitimateinterest_en.pdf&quot;&gt;guidelines
on processing based on Art.6(1)(f)&lt;/a&gt;&amp;nbsp;note three
cumulative conditions to enable processing based on legitimate
interests:&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;the pursuit of a legitimate interest by the controller or
by a third party;&lt;/li&gt;
  &lt;li&gt;the need to process personal data for the purposes of the
legitimate interest(s) pursued; and&lt;/li&gt;
  &lt;li&gt;the interests or fundamental freedoms and rights of the
concerned data subjects do not take precedence over the legitimate
interest(s) of the controller&amp;nbsp;&lt;u&gt;or of a third party&lt;/u&gt;.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Let&#39;s review those in turn.&lt;/p&gt;
&lt;p&gt;Detecting and correcting bias involves the pursuit of a
legitimate interest of the controller, i.e. AI developer, &lt;u&gt;&lt;b&gt;&lt;i&gt;and&lt;/i&gt;&lt;/b&gt;&amp;nbsp;third
parties&lt;/u&gt;. I&#39;d argue that many, many third parties,
being&amp;nbsp;&lt;b&gt;those in relation to whom the AI is &lt;i&gt;&lt;u&gt;to
be used&lt;/u&gt;&lt;/i&gt;&lt;/b&gt;, have a legitimate interest
in&amp;nbsp;&lt;b&gt;not&lt;/b&gt;&amp;nbsp;being discriminated against
due to biased AI. I&#39;ve already mentioned biased AI resulting in
wrongful arrests, denial of services important to life like food
buying, and debanking (see 23.5 of my&amp;nbsp;&lt;a href=&quot;https://bit.ly/hontechbookpdf&quot;&gt;free PDF&lt;/a&gt;&amp;nbsp;under
Facial recognition).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It is indeed necessary to process personal data of people in
certain groups in order to train AI models to reduce bias, as per the
experiences noted above and much more.
&lt;/p&gt;
&lt;p&gt;Finally, the balancing test in the final limb must clearly
consider the legitimate interests, not just of the controller, but also
of &quot;a third party&quot; - in this case, the legitimate interest of third
parties, in relation to whom the AI is to be used, &lt;b&gt;not to be discriminated against&lt;/b&gt;. (While &lt;b&gt;fairness&lt;/b&gt; is a core principle of the GDPR, this only concerns fairness to the individual whose personal data is being processed. Processing A&#39;s personal data to try to ensure fairness to B isn&#39;t a concept explicitly provided for in GDPR. There are mentions of &quot;rights and freedoms of others&quot; or other data subjects, but more in the sense of &lt;b&gt;not&lt;/b&gt; adversely affecting their rights/freedoms, rather than positive obligations in their favour.)&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I argue that, &lt;b&gt;&lt;i&gt;if &lt;/i&gt;&lt;/b&gt;the
conditions in Art.10(5) AI Act are implemented as a minimum when
training AI using personal data, that should tilt the balancing test in
favour of the controller &lt;b&gt;&lt;u&gt;&lt;i&gt;and those third
parties&lt;/i&gt;&lt;/u&gt;&lt;/b&gt;, and enable legitimate interests
to be used as the legal basis for the training - at least in the case
of non-special category data - &lt;i&gt;even&lt;/i&gt; when training &lt;b&gt;non&lt;/b&gt;-high-risk
AI. I really hope the EDPB will agree.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, the problem remains of how to use &lt;b&gt;special
category data&lt;/b&gt; to train &lt;b&gt;non&lt;/b&gt;-high-risk AI
systems to detect and address bias. Some examples I mentioned could
fall through the cracks.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The UK Passport Office&#39;s AI system, designed to reject
photos with &quot;inappropriate&quot; facial features, is probably a high-risk AI
system within &lt;a href=&quot;http://bit.ly/eu-aiact#a3&quot;&gt;Annex
III&lt;/a&gt; para.5(a) (if the Act applied in the UK). Yet, para.5
(and Annex III more generally) does &lt;i&gt;not&lt;/i&gt; protect
anyone from being refused a private bank account or being debanked as a
result of biased AI being applied to them.&lt;/p&gt;
&lt;p&gt;And, &lt;u&gt;a huge hole in the AI Act is this:&lt;/u&gt;
Annex III para.1(a) &lt;i&gt;&lt;b&gt;excludes&lt;/b&gt;&lt;/i&gt;&amp;nbsp;&quot;AI
systems intended to be used for biometric verification the sole purpose
of which is to confirm that a specific natural person is the person he
or she claims to be&quot;. What if an AI biometric verification system used
by a bank mistakenly says someone is &lt;b&gt;&lt;i&gt;not&lt;/i&gt;&lt;/b&gt;&amp;nbsp;who
they claim to be, because it can&#39;t verify the identity of non-white
people properly due to not having been trained on the faces of enough
non-white people - and therefore the bank&#39;s systems automatically
debanks that individual? How can such a biased AI biometric
verification system be &quot;fixed&quot;, if it can&#39;t be fully trained in this
way?&lt;/p&gt;
&lt;p&gt;Such an AI system is&amp;nbsp;&lt;b&gt;&lt;i&gt;not&lt;/i&gt;&lt;/b&gt;&amp;nbsp;classed
as a high risk AI system, because of the biometric verification
exclusion. Therefore, the developer &lt;b&gt;isn&#39;t &lt;/b&gt;allowed
to train the AI using special category data, because Art.10(5) AI Act
only allows this for &lt;b&gt;high-risk &lt;/b&gt;AI systems! (Yes, I
know there&#39;s the odd situation where biometric data is &quot;special
category&quot; data &lt;b&gt;only &lt;/b&gt;when used for the purpose of
uniquely identifying someone, so it could be argued that using
non-white people&#39;s facial biometrics to train personal data isn&#39;t
processing &lt;b&gt;their&lt;/b&gt; special category data, because the
processing purpose isn&#39;t to identify those specific people, and I&#39;d
certainly be putting that argument and pushing for being able to use
legitimate interests for that training. But - really? Why should those
arguments be necessary?)&lt;/p&gt;
&lt;p&gt;It was argued that Art.9(2)(g) (necessary for reasons of
substantial public interest etc) doesn’t allow processing of special
category data to train AI, even though there is a substantial public
interest in addressing bias. I agree there is a huge public interest
there, but I also agree that, due to the wording of that provision, it
can’t apply unless proportionate etc. EU or Member State law provides a
basis for such processing. EU law in the form of AI Act Art.10* does
provides a basis for processing special category data in high-risk AI
systems - doesn’t provide such a basis in the case of non-high-risk AI,
or non-special category data - hence the need to argue that biometric
data isn’t special category when used for training! I guess it’ll have
to be down to national laws to provide for this clearly enough. France,
Germany or Ireland, perhaps?&lt;/p&gt;
&lt;p&gt;(&lt;b&gt;Consent&lt;/b&gt;&amp;nbsp;isn’t feasible in
practice here, given the volumes involved, and issues like having to &lt;b&gt;repeat&lt;/b&gt;
AI training after removing, from the training data, any personal data
where consent has been withdrawn. It was argued that financial costs or
training time for AI developers shouldn’t be relevant in data
protection, but equally it was argued that environmental costs etc. of
repeating training &lt;b&gt;are&lt;/b&gt; relevant. I’ll only mention
briefly practical workarounds, like not removing that data but
preventing it from appearing in outputs using technical measures whose
efficacy is debated)&lt;/p&gt;
&lt;p&gt;If including &lt;b&gt;my&lt;/b&gt;&amp;nbsp;personal data
in training datasets can help to reduce the risk of otherwise biased AI
systems discriminating against &lt;b&gt;you&amp;nbsp;&lt;/b&gt;(should
you be in the same ethnic or other grouping as me) when
deployed,&amp;nbsp; personally I&#39;d be OK with that - partly informed by
my own bad experiences with AI biometrics. Shouldn&#39;t such processing of
data for AI training be permitted, even encouraged? But, currently,
this issue is not properly or fully addressed, as I&#39;ve shown above. So,
there&#39;s a big data dilemma here, that still remains to be dealt with.&lt;/p&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;AI models and personal data&lt;/h4&gt;
&lt;p&gt;Does an AI model &quot;contain&quot; personal data, given that
strictly it&#39;s not a database per se? Or is it just something that can
be used to&amp;nbsp;&lt;i&gt;produce&lt;/i&gt; personal data &lt;i&gt;when
used &lt;/i&gt;in deployment, with personal data being processed only
at the usage stage? Much debate, and diametrically opposing views (and difficult questions like, can a GPAI model developer be said to control the &lt;b&gt;purposes and &lt;/b&gt;means for which &lt;b&gt;&lt;i&gt;deployers&lt;/i&gt; &lt;/b&gt;of the model use it?). [Added: I meant to expand on that the clarify that question, is the model developer controlling the &lt;b&gt;purposes&lt;/b&gt; of processing personal data, particularly with general-purpose/foundation models, or is it merely providing part of the &lt;b&gt;means&lt;/b&gt;&amp;nbsp;of processing to others, i.e. is it really a &quot;controller&quot;?]&lt;/p&gt;
&lt;p&gt;Rather than pinhead-dancing around that question, personally
I think that&amp;nbsp;&lt;b&gt;use of a deployed AI system&lt;/b&gt;&amp;nbsp;is
the most relevant processing here, because that&#39;s the main point at
which the LLMs/large language models (that the event focused on, pretty much exclusively) could &lt;b&gt;regurgitate&lt;/b&gt;&amp;nbsp;accurate or inaccurate personal data -
whether through &lt;b&gt;prompt injection attacks&lt;/b&gt; or
similar in the case of LLMs, or because a model&#39;s guardrails weren&#39;t strong
enough.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I feel the EDPB&#39;s query on technical ways to evaluate
whether an AI model trained using personal data &quot;still processes
personal&quot; data is really more one for &lt;b&gt;technical&lt;/b&gt; AI
experts to answer, and that what merits more attention is &lt;b&gt;preventing
training data&#39;s regurgitation/extraction&lt;/b&gt;&amp;nbsp;at the deployment/use stage, whether personal
data or otherwise.&amp;nbsp; It&#39;s well known that attacks
have successfully obtained training personal data from models - although with some limitations and caveats (&lt;a href=&quot;https://arxiv.org/abs/2311.17035&quot;&gt;paper&lt;/a&gt;&lt;span&gt;&amp;nbsp;&amp;amp;&amp;nbsp;&lt;a href=&quot;https://not-just-memorization.github.io/extracting-training-data-from-chatgpt.html&quot;&gt;article&lt;/a&gt;&lt;span&gt;;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://www.wired.com/story/openai-custom-chatbots-gpts-prompt-injection-attacks/&quot;&gt;another article&lt;/a&gt;)&lt;/span&gt;. This has been shown to be possible not only with &lt;b&gt;open source
&lt;/b&gt;models (where attackers obviously have access to more info about the
model, its parameters etc., and indeed to the model itself), but even &lt;b&gt;semi-open and closed source&lt;/b&gt; models like ChatGPT&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;Again, my view is that &lt;b&gt;assessing
and reducing training data regurgitation/extraction risks&lt;/b&gt; are
essentially questions for &lt;b&gt;technical AI experts&lt;/b&gt;. Reducing such risks mainly involve technical measures, and this is an emerging area where much research continues to be conducted, so I feel it&#39;s
premature to rule on such measures at this point in time (although &lt;b&gt;organisational&lt;/b&gt;
measures are also possible, and recommended, like deployers prohibiting
their users from trying to extract personal data from any AI).&lt;/span&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span&gt;AI value chain: controllers, processors&lt;/span&gt;&lt;/h4&gt;&lt;p&gt;More interesting, and difficult, from a GDPR
perspective are the crucial questions of: who is a&amp;nbsp;&lt;b&gt;controller&lt;/b&gt;,
who is a&amp;nbsp;&lt;b&gt;processor&lt;/b&gt;, who is &lt;b&gt;liable
&lt;/b&gt;for what, and at &lt;b&gt;which stages&lt;/b&gt; in the AI
lifecycle?&amp;nbsp;&lt;/p&gt;&lt;p&gt;Unfortunately, these weren&#39;t really discussed at the event. To be fair, the focus of the event was meant to be legitimate interests, &lt;b&gt;not &lt;/b&gt;the controller/processor position of AI model/system providers.&amp;nbsp;&lt;/p&gt;&lt;p&gt;I still tried to raise them, but wasn&#39;t allowed to speak again to clarify my points, so I&#39;ll do that below in the form of some &quot;exam questions&quot;. But, first, I want to spell out some issues with the AI supply chain that I couldn&#39;t expand on during the event.&lt;/p&gt;&lt;p&gt;If a developer organisation makes its&amp;nbsp;&lt;b&gt;own AI model&lt;/b&gt;&amp;nbsp;available for customers to use, depending on the business model adopted by the organisation (and the following isn&#39;t comprehensive!), the &lt;b&gt;supply chain&lt;/b&gt; can involve several alternative options:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The model could be accessed via the model developer&#39;s API, and/or&lt;/li&gt;&lt;li&gt;The model could be permitted to be:&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Downloaded by customers as a &lt;b&gt;standalone model&lt;/b&gt;, then&amp;nbsp;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Embedded/integrated&amp;nbsp;&lt;/b&gt;within an &lt;b&gt;AI system developed by the customer&lt;/b&gt; (which the customer could use internally only, or offer to its &lt;b&gt;own customers&lt;/b&gt; in turn), or&lt;/li&gt;&lt;li&gt;Accessed by a customer-developed AI system (which the customer could use internally only, or offer to its&amp;nbsp;&lt;b&gt;own customers&lt;/b&gt;&amp;nbsp;in turn) via &lt;b&gt;API&lt;/b&gt;, where the downloaded model is hosted&lt;/li&gt;&lt;ul&gt;&lt;li&gt;on-prem, or&amp;nbsp;&lt;/li&gt;&lt;li&gt;(more likely) in-cloud, using the customer&#39;s&amp;nbsp;&lt;b&gt;IaaS/PaaS&amp;nbsp;&lt;/b&gt;provider, but with all AI-related operations being &lt;b&gt;self-managed&lt;/b&gt; by the customer, or&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;li&gt;(Common nowadays)&amp;nbsp;&lt;b&gt;deployed and used&lt;/b&gt;&amp;nbsp;by the customer for the &lt;b&gt;customer&#39;s AI system&amp;nbsp; &lt;/b&gt;(which the customer could use internally only, or offer to its&amp;nbsp;&lt;b&gt;own customers&lt;/b&gt;&amp;nbsp;in turn), through the customer using a &lt;b&gt;provider&#39;s cloud AI management platform&lt;/b&gt;&amp;nbsp;with the benefit of tools/services available from the cloud provider to ease AI-related operations like fine-tuning models, building AI systems, using RAG, etc.&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Note: the model used could be one of the cloud provider&#39;s own models (i.e. where the cloud provider is the model developer), or it could be a third-party model offered through the cloud provider&#39;s own&amp;nbsp;&lt;b&gt;AI marketplace or similar&lt;/b&gt;. Exactly what &lt;b&gt;licence/contract terms &lt;/b&gt;apply to the customer in such a scenario, particularly with third-party models, let alone what the &lt;b&gt;controller/processor &lt;/b&gt;position is there, is still clear as mud (see below).&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;/ul&gt;Note that an AI system can use or integrate &lt;b&gt;more than one AI model&lt;/b&gt;.&lt;div&gt;&lt;br /&gt;&lt;div&gt;Also note that the above applies equally to how an &lt;b&gt;AI system&lt;/b&gt; is accessed, i.e. via API, or by embedding the system within an AI product/solution/tool, or using a cloud AI management platform, and that an AI system can use or integrate &lt;b&gt;more than one other AI system&lt;/b&gt; (i.e. rinse and repeat the above, on AI models, to AI &lt;b&gt;&lt;i&gt;systems&lt;/i&gt;&lt;/b&gt;). See my PDF that I&#39;d previously &lt;a href=&quot;https://www.linkedin.com/posts/wkhon_ai-model-ai-system-provider-deployer-activity-7238871865190944768-erlx&quot;&gt;uploaded to LinkedIn&lt;/a&gt; (with a small clarificatory update):&lt;/div&gt;&lt;div&gt;&lt;p&gt;
  &lt;iframe allow=&quot;autoplay&quot; height=&quot;480&quot; src=&quot;https://drive.google.com/file/d/1qQ1oGBY64eVLFGv84tThz4zfYqxzLYOm/preview&quot; width=&quot;640&quot;&gt;&lt;/iframe&gt;&lt;/p&gt;&lt;p&gt;And I won&#39;t even mention the twists introduced by using RAG/retrieval-augmented generation in LLMs, at this point.&lt;/p&gt;&lt;p&gt;All that spelt out, now on to my exam questions!:&lt;/p&gt;
&lt;ol style=&quot;text-align: left;&quot;&gt;
  &lt;li&gt;&lt;b&gt;After an organisation deploys a third-party model in an AI
system&lt;/b&gt;&lt;/li&gt;
  &lt;ol&gt;
    &lt;li&gt;If a user in the organisation deliberately extracts
personal data from the AI &lt;i&gt;without&lt;/i&gt; the
deploying/employing organisation&#39;s authorisation&lt;/li&gt;
    &lt;ol&gt;
      &lt;li&gt;Is the rogue user a controller in their own right, so
that the organisation is &lt;b&gt;not&lt;/b&gt; responsible as a
controller under data protection law (as with the Morrisons case in the
UK)?&lt;/li&gt;
      &lt;li&gt;Does or should the &lt;b&gt;AI model developer &lt;/b&gt;bear any responsibility or liability &lt;b&gt;at the deployment and use stage&lt;/b&gt; as a
&lt;b&gt;controller&lt;/b&gt; in some way, if the guardrails they implemented against the
extraction weren&#39;t appropriate? Or could it be a &lt;b&gt;processor&lt;/b&gt;, particularly if the model is hosted by the model or system developer?&lt;/li&gt;
      &lt;ol&gt;
        &lt;li&gt;Even if the model is considered&amp;nbsp;&lt;b&gt;&lt;i&gt;not&lt;/i&gt;&amp;nbsp;&lt;/b&gt;to
&quot;contain&quot; any personal data, so that the model developer is &lt;i&gt;not&lt;/i&gt;
a controller of the model itself, could the model developer be considered to have some
responsibility &lt;b&gt;if and when&lt;/b&gt; personal data is
extracted from the AI at the deployment and use stage?&lt;/li&gt;
        &lt;li&gt;Remember, for security measures under GDPR, a
security breach alone &lt;i&gt;doesn&#39;t&lt;/i&gt; mean the security
measures weren&#39;t appropriate; it&#39;s quite possible for an organisation
that had implemented appropriate security measures to suffer a personal
data breach nevertheless.&lt;/li&gt;
        &lt;li&gt;Also to reiterate, measures to reduce the risk of
extracting training data from AI models are still being developed, this is very much a nascent research area.&lt;/li&gt;&lt;li&gt;Recall that a developer providing software for download/on-prem install is&amp;nbsp;&lt;b&gt;not&lt;/b&gt;&amp;nbsp;generally considered a processor or controller, but when it offers software via the cloud as SaaS, it&amp;nbsp;&lt;i style=&quot;font-weight: bold;&quot;&gt;is&lt;/i&gt;&lt;i style=&quot;font-weight: bold;&quot;&gt;&amp;nbsp;&lt;/i&gt;at least a &lt;b&gt;processor&lt;/b&gt;, even a controller to the extent it uses customer data for its own purposes. If a model developer makes available a model (software), but &lt;b&gt;doesn&#39;t&lt;/b&gt; host it for customers, it seems the developer shouldn&#39;t even be a processor?&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
      &lt;/ol&gt;
    &lt;/ol&gt;
    &lt;li&gt;If a user in the organisation deliberately extracts
personal data from an AI&amp;nbsp;&lt;i&gt;with&lt;/i&gt;&amp;nbsp;the
deploying/employing organisation&#39;s authorisation (e.g. for research, or
for the organisation&#39;s own purposes)&lt;/li&gt;
    &lt;ol&gt;
      &lt;li&gt;Is the organisation a controller, responsible/liable
for that extraction as &quot;processing&quot;? (and could the GDPR research
exemption apply there, if for research?)&lt;/li&gt;
      &lt;li&gt;Could the AI model developer and/or AI system
developer bear any responsibility or liability for this extraction as a controller in some
way,&amp;nbsp;if the guardrails they implemented against the extraction
weren&#39;t appropriate, as above, or as a processor?&amp;nbsp;&lt;/li&gt;
      &lt;ol&gt;
        &lt;li&gt;Note the same points/queries apply as in 1.1 above!&lt;/li&gt;
      &lt;/ol&gt;
    &lt;/ol&gt;
    &lt;li&gt;If a user in the organisation uses the AI in such a way
that, &lt;b&gt;without &lt;/b&gt;the user intending it, the AI
regurgitates personal data, who is responsible as controller for the
output, which is &quot;processing&quot;?&lt;/li&gt;
    &lt;ol&gt;
      &lt;li&gt;Remember, a user could process personal data by
including it in the input provided to the AI (not discussed further
here), but personal data could also be processed if it is included in
the AI&#39;s&amp;nbsp;&lt;b&gt;output&lt;/b&gt;&lt;/li&gt;
      &lt;li&gt;Does or should the AI model developer and/or AI system
developer bear any responsibility or liability as a controller in some
way,&amp;nbsp;if the guardrails they implemented against inadvertent
regurgitation weren&#39;t appropriate, or could it be a processor, or neither?&lt;/li&gt;
      &lt;ol&gt;
        &lt;li&gt;Note the same points/queries apply as with deliberate
extraction, 1.1 above.&lt;/li&gt;
      &lt;/ol&gt;
      &lt;li&gt;What difference if any does it make if the personal
data in the output is accurate, or &lt;b&gt;inaccurate&lt;/b&gt; (e.g.
&lt;b&gt;defamatory&lt;/b&gt; of the individual concerned)?&amp;nbsp;&lt;/li&gt;
    &lt;/ol&gt;
    &lt;li&gt;If a person unrelated to the organisation, e.g. a
third-party hacker, manages to &lt;b&gt;access the deployed AI&lt;/b&gt;
to extract training data such as personal data, is the deploying
organisation responsible as controller? What about the model/system
developer?&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
  &lt;/ol&gt;
  &lt;li&gt;Do any of the above apply, are they relevant, when a AI developer makes its&amp;nbsp;&lt;b&gt;model&lt;/b&gt;&amp;nbsp;available to customers via the developer&#39;s &lt;b&gt;API&lt;/b&gt;&amp;nbsp;only? Is the model developer/provider a &lt;b&gt;processor&lt;/b&gt;&amp;nbsp;for customers in that situation?&lt;/li&gt;&lt;ol&gt;&lt;li&gt;Again see 1.1 above. In particular, it seems the AI developer hosting the model offered to customers would at least be a processor here.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;&lt;li&gt;What if a customer uses a third-party AI model &lt;b&gt;hosted by the customer&#39;s cloud provider&lt;/b&gt;? Is the cloud provider only a &lt;b&gt;processor&lt;/b&gt; for the customer, or could it be a &lt;b&gt;controller&lt;/b&gt;&amp;nbsp;in any way?&lt;/li&gt;&lt;ol&gt;&lt;li&gt;Does it make a difference if the model used by the customer is the cloud provider&#39;s &lt;b&gt;own model&lt;/b&gt;, or another party&#39;s model?&lt;/li&gt;&lt;li&gt;Does it make a difference if the model&#39;s use is &lt;b&gt;completely self-managed&lt;/b&gt; by the customer, or if the customer is using a cloud provider&#39;s &lt;b&gt;cloud AI management platform&lt;/b&gt;?&lt;/li&gt;&lt;li&gt;Do the license terms, cloud agreement terms and/or other terms applicable to the customer&#39;s use of the cloud service/AI platform affect the position (under GDPR it&#39;s the factual control of purposes and means that matters, and contract terms are &lt;b&gt;not &lt;/b&gt;determinative, but nevertheless terms could influence the factual position in some cases, especially in what they permit or prohibit...).&lt;/li&gt;&lt;li&gt;Indeed, back to the AI Act, who is the &lt;b&gt;model provider&lt;/b&gt; - the AI platform provider, or the model developer?&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;&lt;li&gt;Rinse and repeat for &lt;b&gt;AI system developers/providers&lt;/b&gt;&amp;nbsp;- could they be responsible/liable as controllers and/or processors especially if a model provider hosts its model or AI systems using its model for customers in-cloud?&lt;/li&gt;
&lt;/ol&gt;(There are many more questions and issues, these are just the key ones that spring to mind most immediately, believe it or not!)&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Answers on a postcard...?&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/1741203701488045562'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/1741203701488045562'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2024/11/ai-legitimate-interests.html' title='AI: legitimate interests, controller/processor questions - data protection/privacy'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-4057187030330840465</id><published>2024-11-16T15:05:00.007+00:00</published><updated>2024-11-16T15:06:34.056+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="data centres"/><category scheme="http://www.blogger.com/atom/ns#" term="managed service providers"/><category scheme="http://www.blogger.com/atom/ns#" term="managed services"/><category scheme="http://www.blogger.com/atom/ns#" term="MSPs"/><category scheme="http://www.blogger.com/atom/ns#" term="NIS"/><category scheme="http://www.blogger.com/atom/ns#" term="NIS Regulations"/><category scheme="http://www.blogger.com/atom/ns#" term="outsourcing"/><category scheme="http://www.blogger.com/atom/ns#" term="RDSPs"/><category scheme="http://www.blogger.com/atom/ns#" term="uk"/><title type='text'>Cyber Security &amp; Resilience Bill: consultation</title><content type='html'>&lt;p&gt;DSIT is &lt;a href=&quot;https://dsit.qualtrics.com/jfe/form/SV_bf6Y3HTrsifNKxo&quot;&gt;seeking views&lt;/a&gt; on some measures planned&amp;nbsp;under the UK Cyber Security and Resilience Bill, to be &lt;a href=&quot;https://www.gov.uk/government/publications/dsit-cyber-security-newsletter-september-2024/dsit-cyber-security-newsletter-september-2024#:~:text=Cyber%C2%A0Security%C2%A0and%20Resilience%20Bill%20in%202025&quot;&gt;introduced&lt;/a&gt; &lt;a href=&quot;https://www.gov.uk/government/collections/cyber-security-and-resilience-bill#:~:text=introduced%20to%20Parliament-,in%202025.,-How%20can%20I&quot;&gt;in 2025&lt;/a&gt; to update&amp;nbsp;&lt;a href=&quot;https://www.legislation.gov.uk/uksi/2018/506&quot;&gt;The Network and Information Systems Regulations 2018&lt;/a&gt;. I saw this a couple of days ago on the &lt;a href=&quot;https://ico.org.uk/for-organisations/the-guide-to-nis/&quot;&gt;ICO&#39;s NIS webpage,&lt;/a&gt;&amp;nbsp;then found more info on &lt;a href=&quot;https://www.techuk.org/resource/government-seeking-industry-feedback-for-cyber-security-resilience-bill.html&quot;&gt;techUK&#39;s 8 Nov webpage&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Usefully, techUK has also listed &lt;a href=&quot;https://www.techuk.org/asset/D73B185A%2D1EEC%2D4FC7%2DABCB285D22D59B99/&quot;&gt;all the consultation questions&lt;/a&gt; in one PDF, which is really helpful as, unlike EU consultations that usually offer a downloadable PDF listing the questions, sadly too many UK consultations expect respondents to go through a form page by page before they can see what the questions are, which wastes time for those wanting to provide considered responses to all questions holistically (some webpages don&#39;t even allow going back).&lt;/p&gt;&lt;p&gt;The deadline is soon according to ICO:&amp;nbsp;&lt;b&gt;&lt;u&gt;21 Nov 24&lt;/u&gt;&lt;/b&gt;, i.e. next Sunday!&lt;/p&gt;&lt;p&gt;As you&#39;ll know, the intention is to expand the NIS Regulations to catch even more types of organisations, and to reduce incident reporting deadlines (with staffing/costs implications for 24 hr reporting especially at the weekend). Some proposals resemble the changes under the &lt;a href=&quot;https://eur-lex.europa.eu/eli/dir/2022/2555&quot;&gt;EU&#39;s NIS2 Directive&lt;/a&gt;. Managed service providers will probably be brought into scope (proposed criteria below). Note the queries on the costs of rolling out MFA, and of password resets. DSIT is also asking competent authorities (but it seems not other stakeholders) whether data centres should be regulated. Interestingly, it also asks if any Competent Authorities currently review the supplier contracts of regulated entities for visibility into their supply chain,&amp;nbsp;assurance of supplier cyber security and resilience measures, and/or have audit rights - familiar from GDPR, but could this be specifically required in future under NIS too?&lt;/p&gt;&lt;p&gt;Key excerpts:&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;Managed service providers (MSPs) to be brought within scope of Relevant Digital Service Provider (RDSP)&lt;/h4&gt;&lt;div&gt;&lt;div&gt;DSIT&#39;s proposed characteristics of a Managed Service Provider have 4 criteria:&lt;/div&gt;&lt;div&gt;1. The service is provided by one business to another business, and&lt;/div&gt;&lt;div&gt;2. The service is related to the provision of IT services, such as systems, infrastructure, networks, and/or security, and&lt;/div&gt;&lt;div&gt;3. The service relies on the use of network and information systems, whether this is the network and information systems of the provider, their customers or third parties, and&lt;/div&gt;&lt;div&gt;4. The service provides regular and ongoing management support, active administration and/or monitoring of IT systems, IT infrastructure, IT network, and/or the security thereof.&lt;/div&gt;&lt;/div&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/h4&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;Incident reporting&lt;/h4&gt;&lt;div&gt;&lt;div&gt;Changes being considered &quot;to ensure more incidents are reported and that incident information is communicated to relevant parties more quickly and clearly&quot; include:&lt;/div&gt;&lt;div&gt;&quot;1. A change to the definition of an incident under the existing NIS Regulations. To meet the current reporting threshold, an incident must have led to a significant or substantial disruption to service continuity. We are proposing to change the definition of a reportable incident to ensure that &lt;b&gt;a wider range of incidents are captured&lt;/b&gt;, including incidents &lt;b&gt;capable of resulting in a significant impact to service continuity&lt;/b&gt; and incidents that &lt;b&gt;compromise the integrity&lt;/b&gt; of a network and information system.&lt;/div&gt;&lt;div&gt;2. A change to the amount of time an organisation has to report an incident from when it is detected. Currently, incidents must be reported without undue delay and no later than 72 hours after being made aware of the incident. We are assessing whether this time can be reduced to no later than &lt;b&gt;24 hours &lt;/b&gt;after being made aware of the incident.&lt;/div&gt;&lt;div&gt;3. New transparency requirements. We are considering introducing a transparency requirement which will ensure customers are notified of incidents which significantly compromise the integrity of a digital service upon which they rely.&quot;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;On &lt;b&gt;24-hr reporting&lt;/b&gt;, DSIT wants to know:&lt;/div&gt;&lt;div&gt;&lt;div&gt;1. &lt;b&gt;Which members of staff&lt;/b&gt; are needed to develop and submit an NIS incident report?&lt;/div&gt;&lt;div&gt;2. Do you have the people required to submit an incident report already working &lt;b&gt;weekend shifts&lt;/b&gt;?&lt;/div&gt;&lt;div&gt;3. Could you have staff &lt;b&gt;on call&lt;/b&gt; as opposed to working weekend shifts in case there is the need to report an NIS incident? Could you save money by calling in members of staff when an incident is detected?&lt;/div&gt;&lt;div&gt;4. Is there a &lt;b&gt;higher rate of pay&lt;/b&gt; for staff working weekends than those working during the week? If so, what overtime rate do staff get paid?&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;On transparency:&lt;/div&gt;&lt;div&gt;5. If an incident occurred which affected a service you provide, &lt;b&gt;would you be able to&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;identify which customers&lt;/b&gt; have been affected? (‘Customers’ in this question should&lt;/div&gt;&lt;div&gt;be interpreted as businesses which rely on a digital service provider [cloud provider] for a service,&lt;/div&gt;&lt;div&gt;not individual clients.) If so, &lt;b&gt;how long would it take to identify&lt;/b&gt; which customers have&lt;/div&gt;&lt;div&gt;been affected?&lt;/div&gt;&lt;div&gt;6. Do you have a &lt;b&gt;plan in place&lt;/b&gt; for what to do if an incident occurs? [For RDSPs [i.e. cloud providers]]&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;MSPs:&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;7. [for OES] Do you use &lt;b&gt;services provided by an MSP&lt;/b&gt; (or multiple MSPs) to deliver your essential service(s)? This would also include, for example, companies which provide &lt;b&gt;IT outsourcing, BPO&amp;nbsp; &lt;/b&gt;(business process outsourcing) where it is provided through IT networks, or &lt;b&gt;cyber security services&lt;/b&gt;.&lt;/div&gt;&lt;div&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;a. If yes, please provide examples of where these services provided by an MSP (or multiple MSPs) are critical to the provision of your essential service? (note: names of companies are not required)&lt;/div&gt;&lt;div&gt;8. [for RDSPs] Do you provide &lt;b&gt;managed services&lt;/b&gt;? This would include, for example, providing IT outsourcing, Business Process Outsourcing (BPO) where it is provided through IT networks, or managed security services.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;9. Do you provide Business Process Outsourcing (BPO) services that involve &lt;b&gt;ongoing management of an IT system/ infrastructure/network&lt;/b&gt; and have a connection or access to the customer?&lt;/div&gt;&lt;div&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;a. If yes, please provide examples of the BPO services provided by your organisation.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;10. Do you provide managed IT services that &lt;b&gt;secure or manage operational technology (OT)&lt;/b&gt;?&lt;/div&gt;&lt;div&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;a. If yes, please provide examples. Detailed examples are welcome, particularly where these relate to critical national infrastructure (CNI).&lt;/div&gt;&lt;div&gt;11. Do you provide &lt;b&gt;system integration&lt;/b&gt;?&lt;/div&gt;&lt;div&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;a. If yes, is the system integration provided as part of a managed service? Please provide examples of the system integration you provide as part of a managed service.&lt;/div&gt;&lt;div&gt;12. Do you &lt;b&gt;provide telecommunications services (e.g. WAN, LAN)&lt;/b&gt;?&lt;/div&gt;&lt;div&gt;- If yes, please provide examples of the telecommunications services you provide.&lt;/div&gt;&lt;div&gt;- If yes, do you consider that any of these telecommunication services constitute a ‘managed service’?&lt;/div&gt;&lt;div&gt;- If yes, are these telecommunications services regulated under the Communications Act 2003?&lt;/div&gt;&lt;div&gt;13. Is the cyber security of the services you provide (in the UK or overseas) &lt;b&gt;currently regulated&lt;/b&gt;? Are you currently regulated for the cyber security for any of your services offered (in the UK or overseas)?&lt;/div&gt;&lt;div&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;If yes, please provide details of these regulations.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;i&gt;[Questions about small and micro cloud or managed services in the supply chain]&lt;/i&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Operational technology (OT)&lt;/b&gt;:&lt;/div&gt;&lt;div&gt;&lt;div&gt;15. Does your organisation use operational technology to &lt;b&gt;manage any critical or essential services&lt;/b&gt;?&lt;/div&gt;&lt;div&gt;16. [if yes to 15] If you purchase operational technology (OT) from a vendor, do you &lt;b&gt;maintain and operate it ‘in house’&lt;/b&gt;?&lt;/div&gt;&lt;div&gt;17. [if yes to 15] Do you &lt;b&gt;outsource the management of operational technology&lt;/b&gt; (OT) to third party providers?&lt;/div&gt;&lt;div&gt;a. If yes, are these third party providers &lt;b&gt;Managed Service Providers (MSPs)&lt;/b&gt;? (i.e., the same company that manages your IT systems/networks/Infrastructure)&lt;/div&gt;&lt;div&gt;b. If yes, please provide examples of operational technology (OT) that you outsource to third parties (note: a description of the company would suffice, names are not required)&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Managing risks - &lt;b&gt;costs impacts&lt;/b&gt; of serious incidents:&lt;/div&gt;&lt;div&gt;&lt;div&gt;18. How much would it cost your organisation to conduct a full rollout of &lt;b&gt;multi-factor authentication &lt;/b&gt;for all users?&lt;/div&gt;&lt;div&gt;19. How much would it cost your organisation to conduct a full &lt;b&gt;organisation-wide reset of passwords&lt;/b&gt;?&lt;/div&gt;&lt;div&gt;&lt;b&gt;20. What other actions&lt;/b&gt; do you anticipate you might need to take to protect your organisation in the event of a major cyber security attack or resilience incident?&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;i&gt;[Some duplication: the next set of questions is for firms NOT regulated under NIS, including 24-hr reporting and staff costs, OT, managing risks, small/micro MSPs/cloud providers, MSPs]&lt;/i&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;25. If you purchase operational technology (OT) from a vendor, do you maintain and operate it ‘in house’?&lt;/div&gt;&lt;div&gt;26. Do you outsource the management of operational technology (OT) to third party providers?&lt;/div&gt;&lt;div&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;a. If yes, are these third party providers Managed Service Providers (MSPs)? (i.e., the same company that manages your IT systems/networks/Infrastructure)&lt;/div&gt;&lt;div&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;b. If yes, please provide examples of operational technology (OT) you outsource to third parties (note: a description of the company would suffice, company names are not required)&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Plus &lt;b&gt;questions to competent authorities (CAs)&lt;/b&gt; re 24-hr reporting, staff etc., private vs. public organisations regulated and their size from micro to large, and:&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;38. Do any Competent Authorities currently &lt;b&gt;review the supplier contracts&lt;/b&gt; of regulated entities to ensure that appropriate measures are being taken to manage supply chain risk? E.g. that regulated entities have visibility of their &lt;b&gt;suppliers’ supply chain&lt;/b&gt;, have some level of assurance of the &lt;b&gt;cyber security and resilience&lt;/b&gt; measures followed by their supplier, and/or have the &lt;b&gt;right to audit &lt;/b&gt;their supplier? If so, please share details&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Data centres&lt;/b&gt;&lt;/div&gt;&lt;div&gt;39. How many &lt;b&gt;standalone data centres&lt;/b&gt; are owned and operated by OES/RDSP/MSP businesses under your remit in the UK?&lt;/div&gt;&lt;div&gt;40. Do you include standalone data centres owned and operated (enterprise data centres) by OES/RDSP businesses under your remit in your supervisory activity?&lt;/div&gt;&lt;div&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;a. If no under your current scope, have you previously considered or are you currently considering expanding your supervision to focus on your sector’s enterprise data centres?&lt;/div&gt;&lt;div&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;b. If yes, what compliance obligations are applicable to and what assurance is required in relation to OES/RDSP owned-and-operated data centres? For example, appropriate and proportionate measures + CAF.&lt;/div&gt;&lt;div&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;c. If yes, are there any &lt;b&gt;measures or assurance designed for the data centre infrastructure&lt;/b&gt; that you apply and/or assess for your sector&#39;s data centres (or that guide your supervision) under the NIS? For example, standards designed for operational resilience of data centre infrastructure, the cyber security of operational technologies/industrial control systems, or levels of physical security of data centres.&lt;/div&gt;&lt;div&gt;41. To what extent do you agree with the following statements:&lt;/div&gt;&lt;div&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;a. It would be beneficial to have standardised guidance on “appropriate and proportionate” measures in relation to the security and resilience of data centres / data centre infrastructure&lt;/div&gt;&lt;div&gt;(Strongly agree/Agree/Neither agree nor disagree/Disagree/Strongly disagree)&lt;/div&gt;&lt;div&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;b. UK third-party operated data centres should be brought into the scope of the NIS under dedicated supervision with a view to protecting them as CNI and OES/RDSP supply chains?&lt;/div&gt;&lt;div&gt;(Same range from Strongly agree to Strongly disagree)&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/4057187030330840465'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/4057187030330840465'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2024/11/cyber-security-resilience-bill.html' title='Cyber Security &amp; Resilience Bill: consultation'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-2976728211976734677</id><published>2024-10-19T20:56:00.005+01:00</published><updated>2024-10-21T08:27:02.499+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="adtech"/><category scheme="http://www.blogger.com/atom/ns#" term="AI"/><category scheme="http://www.blogger.com/atom/ns#" term="AI uses"/><category scheme="http://www.blogger.com/atom/ns#" term="algorithmic management"/><category scheme="http://www.blogger.com/atom/ns#" term="artificial intelligence"/><category scheme="http://www.blogger.com/atom/ns#" term="clauses"/><category scheme="http://www.blogger.com/atom/ns#" term="EU AI Act"/><category scheme="http://www.blogger.com/atom/ns#" term="fairness"/><category scheme="http://www.blogger.com/atom/ns#" term="G7"/><category scheme="http://www.blogger.com/atom/ns#" term="healthcare"/><category scheme="http://www.blogger.com/atom/ns#" term="LinkedIn"/><category scheme="http://www.blogger.com/atom/ns#" term="LLMs"/><category scheme="http://www.blogger.com/atom/ns#" term="public sector"/><category scheme="http://www.blogger.com/atom/ns#" term="recommender systems"/><category scheme="http://www.blogger.com/atom/ns#" term="RIO"/><category scheme="http://www.blogger.com/atom/ns#" term="training data"/><title type='text'>Things AI, Oct 2024</title><content type='html'>&lt;p&gt;&lt;b&gt;AI tool for meeting recordings, taking notes, creating draft documents&lt;/b&gt;: ICO &lt;a href=&quot;https://ico.org.uk/for-organisations/advice-and-services/innovation-advice/previously-asked-questions/#:~:text=AI%20tool%20for%20meeting%20recordings%2C&quot;&gt;says&lt;/a&gt;&amp;nbsp;if not used for new purpose, can rely on previous legal basis. For any new processing activity/purpose, identify lawful basis! NB. update privacy notice, accuracy, ADM, profiling, consider any data sharing with tool provider (ICO last updated date still says April but this Q&amp;amp;A is new since Sept).&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.scl.org/wp-content/uploads/2024/10/SCL-AI-Group-EU-AI-Act-Contractual-Clauses-13-Oct-2024.pdf&quot;&gt;&lt;b&gt;EU AI Act &lt;/b&gt;contractual clauses&lt;/a&gt; drafted by SCL (I&#39;ve not reviewed them myself). And, the Commission &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/consultations/commission-seeks-feedback-draft-implementing-act-establish-scientific-panel-under-ai-act&quot;&gt;seeks feedback&lt;/a&gt; on a &lt;a href=&quot;https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/14398-Artificial-intelligence-implementing-regulation-establishing-a-scientific-panel-of-independent-experts_en&quot;&gt;draft implementing regulation&lt;/a&gt; for scientific panel of AI experts to assist the AI Office.&lt;/p&gt;&lt;p&gt;&lt;b&gt;EU algorithms regulation:&lt;/b&gt;&amp;nbsp;don&#39;t forget the&amp;nbsp;&lt;a href=&quot;https://data.consilium.europa.eu/doc/document/PE-89-2024-INIT/en/pdf&quot;&gt;EU Platform Work Directive&lt;/a&gt;, just&amp;nbsp;&lt;a href=&quot;https://www.consilium.europa.eu/en/press/press-releases/2024/10/14/platform-workers-council-adopts-new-rules-to-improve-their-working-conditions/&quot;&gt;approved&lt;/a&gt;&amp;nbsp;by the Council; 2-year transposition deadline. This aims to improve working conditions and protection of&amp;nbsp; personal data in platform work (i.e. gig economy workers like drivers) by, among other things, promoting transparency, fairness, human oversight, safety and accountability in algorithmic management in &quot;platform work&quot;. It will require measures on &lt;b&gt;&lt;i&gt;algorithmic management&lt;/i&gt;&lt;/b&gt; of people performing platform work in the EU, including those with no employment contract/relationship. Chapter III on algorithmic management limits certain processing of personal data by means of automated monitoring systems or automated decision-making systems, such as personal data on emotional or psychological state. Similarly where &quot;&lt;b&gt;&lt;i&gt;digital labour platforms&lt;/i&gt;&lt;/b&gt;&quot; use automated systems taking or supporting decisions that affect persons performing platform work; personal data&amp;nbsp;processing by a digital labour platform by means of automated monitoring systems or automated decision-making systems is deemed high risk, requiring a DPIA under GDPR, and more, as well as detailed transparency requirements on automated monitoring systems and automated decision-making systems, and obligations regarding human oversight and human review, etc. There&#39;s certainly overlap with both GDPR and the AI Act.&lt;/p&gt;&lt;p&gt;&lt;b&gt;US EO14110&lt;/b&gt;: &lt;a href=&quot;https://www.nist.gov/system/files/documents/2024/09/30/09-24-about-the-AI-eo-one-pager-9.25.pdf&quot;&gt;NIST 1-pg summary&lt;/a&gt; of progress to date &amp;amp; next steps.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Open source AI&lt;/b&gt;: a &lt;a href=&quot;https://opensource.org/open-source-ai/drafts/the-open-source-ai-definition-1-0-rc1&quot;&gt;draft definition 1.0-RC1&lt;/a&gt; is &lt;a href=&quot;https://opensource.org/blog/the-open-source-ai-definition-v-1-0-rc1-is-available-for-comments&quot;&gt;open for comment&lt;/a&gt;. &lt;a href=&quot;https://hackmd.io/@opensourceinitiative/osaid-faq&quot;&gt;FAQs&lt;/a&gt;; and &lt;a href=&quot;https://opensource.org/blog/how-we-passed-the-ai-conundrums&quot;&gt;must all training data be made available&lt;/a&gt;&amp;nbsp;for openness?&lt;/p&gt;&lt;p&gt;&lt;b&gt;Federated learning&lt;/b&gt;: scalability challenges in privacy-preserving federated learning (UK &lt;a href=&quot;https://rtau.blog.gov.uk/2024/10/08/scalability-challenges-in-privacy-preserving-federated-learning/&quot;&gt;RTAU&lt;/a&gt; &amp;amp; US&amp;nbsp;&lt;a href=&quot;https://www.nist.gov/blogs/cybersecurity-insights/scalability-challenges-privacy-preserving-federated-learning&quot;&gt;NIST&lt;/a&gt;&amp;nbsp;collaboration). (For an explanation of federated learning, please see &lt;a href=&quot;https://bit.ly/hontechbookleaflet&quot;&gt;my book&lt;/a&gt;)&lt;/p&gt;&lt;p&gt;&lt;b&gt;UK AI Safety events&lt;/b&gt;:&amp;nbsp;the Nov 2023 summit&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/government/publications/foi2024-00383-cost-of-the-ai-safety-summit/response-cost-of-the-ai-safety-summit&quot;&gt;cost &lt;/a&gt;£27.7m; plus &lt;a href=&quot;https://www.gov.uk/government/publications/foi2024-00412-frontier-ai-safety-framework-conference/response-frontier-ai-safety-framework-conference&quot;&gt;info on the Nov 2024 event&lt;/a&gt;&amp;nbsp;incl. criteria for invites (names of invitees were withheld for data protection reasons, but names of their organisations were also withheld, not clear why): from FOI requests.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Financial services/finance/securities&lt;/b&gt;:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;https://www.theia.org/sites/default/files/2024-10/Technology%20Working%20Group%20AI%20Report%20Oct%202024.pdf&quot;&gt;Artificial Intelligence: current and future usage within investment management&lt;/a&gt;, report of UK Technology Working Group (industry group for examining the impact of technology on the UK’s investment management sector, with the Investment Association), 10 Oct 24&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.fca.org.uk/firms/innovation/ai-lab&quot;&gt;AI Lab&lt;/a&gt;&amp;nbsp;introduced by UK FCA, 17 Oct 24 (&lt;a href=&quot;https://www.fca.org.uk/publications/corporate-documents/artificial-intelligence-ai-update-further-governments-response-ai-white-paper&quot;&gt;FCA approach to AI&lt;/a&gt;)&lt;/li&gt;&lt;li&gt;New York State Department of Financial Services (DFS) on&amp;nbsp;&lt;a href=&quot;https://www.dfs.ny.gov/industry-guidance/industry-letters/il20241016-cyber-risks-ai-and-strategies-combat-related-risks&quot;&gt;Cybersecurity Risks Arising from Artificial Intelligence and Strategies to Combat Related Risks&lt;/a&gt;, 16 Oct 24&lt;/li&gt;&lt;li&gt;US SEC &lt;a href=&quot;https://www.sec.gov/newsroom/press-releases/2024-167&quot;&gt;charges&lt;/a&gt;&amp;nbsp;Rimar Capital Entities and owner Itai Liptz for defrauding investors by making false and misleading statements about use of AI (also charging one Rimar board member), 10 Oct 24&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Training data collection, not just by web scraping!&lt;/b&gt;: certain robot vacuums were found to&amp;nbsp;&lt;a href=&quot;https://www.abc.net.au/news/2024-10-05/robot-vacuum-deebot-ecovacs-photos-ai/104416632&quot;&gt;collect photos and audio to train AI&lt;/a&gt;, so big security and privacy risks with some robotic hoovers, though reportedly the privacy notice was suitably expansive (but who reads those?!, covering wholesale data collection for research including: device-generated 2D/3D map of user&#39;s houses, voice recordings, photos or videos! Talk about hoovering up data for AI training...😉🙄&lt;/p&gt;&lt;p&gt;&lt;b&gt;LLMs&lt;/b&gt;:&amp;nbsp;&lt;a href=&quot;https://arxiv.org/pdf/2410.05229&quot;&gt;still can&#39;t do maths or reasoning&lt;/a&gt; (Apple researchers)&lt;/p&gt;&lt;p&gt;&lt;b&gt;G7 Hiroshima AI Process&lt;/b&gt; (recall the Code of Conduct etc.) progresses:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;https://www.gov.uk/government/publications/g7-ministerial-declaration-cernobbio-italy-15-october-2024/g7-ministerial-declaration-15-october-2024&quot;&gt;G7 ministerial declaration&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Overview of the OECD pilot of the Hiroshima artificial intelligence process reporting framework (for the international code of conduct for organizations developing advanced AI systems, like foundation models/GPAI) - &lt;a href=&quot;https://www.gov.uk/government/publications/g7-ministerial-declaration-cernobbio-italy-15-october-2024/overview-of-the-oecd-pilot-of-the-hiroshima-artificial-intelligence-process-reporting-framework&quot;&gt;summary&lt;/a&gt; &lt;a href=&quot;https://www.g7italy.it/wp-content/uploads/1728987712-final-overview-of-the-oecd-pilot-of-the-haip-reporting-framework.pdf&quot;&gt;by&lt;/a&gt; the Italian presidency&amp;nbsp;(&lt;a href=&quot;https://oecd.ai/en/g7&quot;&gt;pilot phase&lt;/a&gt;); &lt;a href=&quot;https://www.meti.go.jp/press/2024/10/20241016001/20241016001-1.pdf&quot;&gt;G7 joint statement&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.oecd.org/content/dam/oecd/en/publications/reports/2024/10/g7-toolkit-for-artificial-intelligence-in-the-public-sector_f93fb9fb/421c1244-en.pdf&quot;&gt;G7 toolkit for AI in the public sector&lt;/a&gt; - &quot;a comprehensive guide designed to help policymakers and public sector leaders translate principles for safe, secure, and trustworthy Artificial Intelligence (AI) into actionable policies&quot; - of interest/use to the private sector too. And see the Ada Lovelace Institute&#39;s &lt;a href=&quot;https://www.adalovelaceinstitute.org/report/buying-ai-procurement/&quot;&gt;Buying AI&lt;/a&gt;: s the public sector equipped to procure technology in the public interest?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Adtech&lt;/b&gt;: IAB Tech Lab&#39;s&amp;nbsp;&lt;a href=&quot;https://iabtechlab.com/wp-content/uploads/2024/10/IAB-Tech-Lab-AI-in-Advertising-Primer-Oct-2024.pdf&quot;&gt;AI in advertising primer&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Recommender systems&lt;/b&gt;: seem to be particularly targeted, e.g. under the &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/news/commission-sends-requests-information-youtube-snapchat-and-tiktok-recommender-systems-under-digital&quot;&gt;EU Digital Services Act (DSA)&lt;/a&gt;&amp;nbsp;(and see &lt;a href=&quot;https://blog.kuan0.com/#:~:text=fee%20change%20this%3F-,Children%27s%20data,-%3A%20ICO%27s%20further%C2%A0&quot;&gt;ICO brief consultation re using children&#39;s data&lt;/a&gt; for recommender systems).&lt;/p&gt;&lt;p&gt;&lt;b&gt;AI in healthcare: &lt;/b&gt;increasing focus e.g. by&amp;nbsp;&lt;a href=&quot;https://blog.google/products/google-cloud/generative-ai-healthcare-administration/&quot;&gt;Google&lt;/a&gt;, &lt;a href=&quot;https://www.microsoft.com/en-us/industry/blog/healthcare/2024/10/10/unlocking-next-generation-ai-capabilities-with-healthcare-ai-models/&quot;&gt;Microsoft&lt;/a&gt;. See below on the new UK RIO.&lt;/p&gt;&lt;p&gt;&lt;b&gt;LinkedIn &amp;amp; AI&lt;/b&gt;: LinkedIn may have &lt;a href=&quot;https://blog.kuan0.com/2024/09/#:~:text=ICO%20statement%20on%20LinkedIn%27s%20changes&quot;&gt;agreed&lt;/a&gt; not to train AI using UK users&#39; data, but it &lt;a href=&quot;https://www.theregister.com/2024/10/09/linkedin_ai_misinformation_agreement&quot;&gt;plans&lt;/a&gt;&amp;nbsp;in its &lt;a href=&quot;https://www.linkedin.com/legal/preview/user-agreement&quot;&gt;new user agreement&lt;/a&gt;&amp;nbsp;to put all responsibility for AI-generated content&amp;nbsp;&lt;a href=&quot;https://www.linkedin.com/legal/preview/user-agreement#:~:text=you%20are%20responsible%20for%20ensuring&quot;&gt;on users&lt;/a&gt; - even though, when a user wants to start a new post, it encourages users to &quot;try writing with AI&quot;!&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhjmDPFYWrn-PUtAMomOSpgCXH3auBlSVQyej74AZW0khBcDZjau2qU5VsESyWT2TMDB6m0gxq5dEkrVF4SUXeI_T9nkhjRiw4pXihaw0IGy63lfzo9gom5_NBb67XzWy8PvBt7caEDgquiABmVYRLxYmJiG6z5IlBF4TgksE7XAAf0Go7mZgk2Q0Mbujo&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;71&quot; data-original-width=&quot;342&quot; height=&quot;66&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhjmDPFYWrn-PUtAMomOSpgCXH3auBlSVQyej74AZW0khBcDZjau2qU5VsESyWT2TMDB6m0gxq5dEkrVF4SUXeI_T9nkhjRiw4pXihaw0IGy63lfzo9gom5_NBb67XzWy8PvBt7caEDgquiABmVYRLxYmJiG6z5IlBF4TgksE7XAAf0Go7mZgk2Q0Mbujo&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;a href=&quot;https://openai.com/index/evaluating-fairness-in-chatgpt/&quot;&gt;Fairness&lt;/a&gt;: evaluating first-person fairness in chatbots (&lt;a href=&quot;https://cdn.openai.com/papers/first-person-fairness-in-chatbots.pdf&quot;&gt;PDF&lt;/a&gt;)&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://towardsdatascience.com/bursting-the-ai-hype-bubble-once-and-for-all-581a994fe762&quot;&gt;AI hype&lt;/a&gt;, &lt;a href=&quot;https://www.bruegel.org/sites/default/files/2024-10/WP%2018%202024.pdf&quot;&gt;costs cf productivity&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://www.forbes.com/sites/markcperna/2024/10/01/aiis-ai-making-work-better-or-worse/&quot;&gt;is AI making work worse?&lt;/a&gt;) and &lt;a href=&quot;https://oecd.ai/en/wonk/navigating-the-environmental-impact-of-ai&quot;&gt;environmental&lt;/a&gt; impact (&lt;a href=&quot;https://qz.com/amazon-google-microsoft-nuclear-power-ai-data-centers-1851673653&quot;&gt;is nuclear the answer&lt;/a&gt;?) vs. examples of AI uses: detecting that &lt;a href=&quot;https://www.theguardian.com/law/2024/oct/08/family-court-judges-victim-blaming-language-domestic-abuse-cases-ai-project&quot;&gt;UK family court judges used victim-blaming language&lt;/a&gt; in domestic abuse cases;&amp;nbsp;&lt;a href=&quot;https://aistandardshub.org/from-algorithms-to-allergies/&quot;&gt;stymying mobile phone thieves&lt;/a&gt;; cancer detection (&lt;a href=&quot;https://www.ukri.org/news/robotic-clothing-and-listening-for-cancer-among-new-projects/ &quot;&gt;UKRI&lt;/a&gt;, &lt;a href=&quot;https://www.gov.uk/government/news/new-government-tech-deals-boost-the-business-of-cancer-detection&quot;&gt;gov news&lt;/a&gt;); pollen &amp;amp; &lt;a href=&quot;https://aistandardshub.org/from-algorithms-to-allergies/&quot;&gt;allergies&lt;/a&gt;; UK &lt;a href=&quot;https://www.gov.uk/government/case-studies/proving-the-value-of-the-royal-navys-ai-roadmap&quot;&gt;Royal Navy&lt;/a&gt;&amp;nbsp;like predictive maintenance; helping&amp;nbsp;&lt;a href=&quot;https://blog.google/outreach-initiatives/sustainability/ai-sustainable-cities/&quot;&gt;sustainable cities&lt;/a&gt;; &lt;a href=&quot;https://www.techuk.org/resource/ai-adoption-case-study-learn-how-nix-is-integrating-ai-driven-algorithms-into-fertilisation-treatment-processes.html&quot;&gt;fertilisation treatment&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;UK AI research programs:&lt;/b&gt; include&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/government/news/virtual-reality-and-wearable-technology-pilot-to-cut-drug-deaths&quot;&gt;wearable tech to help drug addicts&lt;/a&gt;; building resilience &lt;a href=&quot;https://www.gov.uk/government/news/research-programme-to-ensure-uk-economy-uses-ai-to-grow-safely&quot;&gt;against&lt;/a&gt; AI risks like deepfakes, misinformation, and cyber-attacks.&lt;/p&gt;&lt;p&gt;&lt;b&gt;UK Regulatory Innovation Office&lt;/b&gt;: the RIO &lt;a href=&quot;https://labour.org.uk/change/kickstart-economic-growth/&quot;&gt;promised&lt;/a&gt;&amp;nbsp;in the Labour manifesto has been &lt;a href=&quot;https://www.gov.uk/government/news/game-changing-tech-to-reach-the-public-faster-as-dedicated-new-unit-launched-to-curb-red-tape&quot;&gt;launched&lt;/a&gt;, within DSIT, &quot;to reduce the burden of red tape and speed up access to new technologies... like AI training software for surgeons to deliver more accurate surgical treatments for patients and drones which can improve business efficiency&quot;, with the 4 initial areas including&amp;nbsp;&lt;b&gt;&lt;i&gt;AI and digital in healthcare&lt;/i&gt;&lt;/b&gt;, and &lt;b&gt;&lt;i&gt;connected and autonomous technology&lt;/i&gt;&lt;/b&gt;. The RIO &quot;it will support regulators to update regulation, speeding up approvals, and ensuring different regulatory bodies work together smoothly. It will work to continuously inform the government of regulatory barriers to innovation, set priorities for regulators which align with the government’s broader ambitions and support regulators to develop the capability they need to meet them and grow the economy... The new office will also bring regulators together and working to remove obstacles and outdated regulations to the benefit of businesses and the public, unlocking the power of innovation&quot;. But the RIO&#39;s first Chair has yet to be appointed, working 4-5 days a month (&lt;a href=&quot;https://apply-for-public-appointment.service.gov.uk/roles/8418&quot;&gt;apply&lt;/a&gt;!). &lt;a href=&quot;https://www.ft.com/content/4fc3131a-5f10-4c08-8289-90cf05f41951&quot;&gt;FT article&lt;/a&gt;&amp;nbsp;(paywall).&lt;/p&gt;&lt;p&gt;(See also my blog on &lt;a href=&quot;https://blog.kuan0.com/2024/10/data-protection-cyber-security-oct-2024.html&quot;&gt;data protection &amp;amp; cyber security&lt;/a&gt;)&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/2976728211976734677'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/2976728211976734677'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2024/10/things-ai-oct-2024.html' title='Things AI, Oct 2024'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEhjmDPFYWrn-PUtAMomOSpgCXH3auBlSVQyej74AZW0khBcDZjau2qU5VsESyWT2TMDB6m0gxq5dEkrVF4SUXeI_T9nkhjRiw4pXihaw0IGy63lfzo9gom5_NBb67XzWy8PvBt7caEDgquiABmVYRLxYmJiG6z5IlBF4TgksE7XAAf0Go7mZgk2Q0Mbujo=s72-c" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-5829639713957974579</id><published>2024-10-19T20:51:00.004+01:00</published><updated>2025-01-12T10:39:56.337+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="adtech"/><category scheme="http://www.blogger.com/atom/ns#" term="cookies"/><category scheme="http://www.blogger.com/atom/ns#" term="CRA"/><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="data protection"/><category scheme="http://www.blogger.com/atom/ns#" term="digital identity"/><category scheme="http://www.blogger.com/atom/ns#" term="EDPB"/><category scheme="http://www.blogger.com/atom/ns#" term="ico"/><category scheme="http://www.blogger.com/atom/ns#" term="IoT"/><category scheme="http://www.blogger.com/atom/ns#" term="NIS2"/><category scheme="http://www.blogger.com/atom/ns#" term="non-material damage"/><category scheme="http://www.blogger.com/atom/ns#" term="passkeys"/><category scheme="http://www.blogger.com/atom/ns#" term="privacy"/><category scheme="http://www.blogger.com/atom/ns#" term="product liability"/><category scheme="http://www.blogger.com/atom/ns#" term="quantum"/><category scheme="http://www.blogger.com/atom/ns#" term="ransomeware"/><category scheme="http://www.blogger.com/atom/ns#" term="SBOM"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="transfers"/><title type='text'>Data protection &amp; cyber security, Oct 2024</title><content type='html'>&lt;p&gt;&lt;b&gt;Cookies: consent or pay OK in UK?&lt;/b&gt;&amp;nbsp;ICO&amp;nbsp;&lt;a href=&quot;https://ico.org.uk/media/about-the-ico/disclosure-log/4031381/ic-331936-v1n1.pdf&quot;&gt;says&lt;/a&gt;&amp;nbsp;it&#39;s a business decision by the organisation, it holds no info! (&lt;a href=&quot;https://ico.org.uk/about-the-ico/our-information/disclosure-log/ic-331936-v1n1/&quot;&gt;FOI&lt;/a&gt;).&lt;/p&gt;&lt;div&gt;&lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32022L2555&quot;&gt;&lt;b&gt;EU NIS2 Directive&lt;/b&gt;&lt;/a&gt;: applies from&amp;nbsp;&lt;b&gt;&lt;i&gt;18 Oct 2024&lt;/i&gt;&lt;/b&gt;&amp;nbsp;(&lt;a href=&quot;https://ec.europa.eu/commission/presscorner/detail/en/ip_24_5342&quot;&gt;news&lt;/a&gt;): see&amp;nbsp;&lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32024R2690&quot;&gt;Commission implementing regulation&lt;/a&gt;&amp;nbsp;on requirements for digital services incl. cloud, CDN, online marketplaces, social networks; too few Member States have transposed it into national law (&lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/NIM/?uri=CELEX:32022L2555&quot;&gt;published Commission list&lt;/a&gt;, so far just Belgium, Croatia, Italy, Latvia, Lithuania).&amp;nbsp;Not listed doesn&#39;t mean &quot;not implemented&quot;: a country might not have notified the Commission yet, or the Commission might not have added it to that list yet. But it&#39;s clear some Member States have missed the deadline,&amp;nbsp;&lt;a href=&quot;https://www.ncsc.gov.ie/nis2/#:~:text=Unfortunately%2C%20the%20transposition%20deadline%20for%20NIS2%20of%2017%20October%202024%20will%20not%20be%20met&quot;&gt;like Ireland&lt;/a&gt;&amp;nbsp;(draft law&amp;nbsp;&lt;a href=&quot;https://www.gov.ie/pdf/?file=https://assets.gov.ie/303962/aa59bc78-e82d-4e74-9e95-b05c0c5a83a1.pdf#page=null&quot;&gt;heads of Bill&lt;/a&gt;). Microsoft has been quick off the mark to&amp;nbsp;&lt;a href=&quot;https://azure.microsoft.com/en-us/blog/leverage-microsoft-azure-tools-to-navigate-nis2-compliance/&quot;&gt;tout&lt;/a&gt;&amp;nbsp;how Azure can help NIS2 compliance.&lt;/div&gt;&lt;div&gt;&lt;span&gt;&amp;nbsp; &amp;nbsp; Added:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://connecteurope.org/sites/default/files/2024-09/downloads/positionpapers/etno-gsma%2520feedback%2520nis2%2520implementing%2520act.pdf&quot;&gt;ETNO-GSMA feedback on draft implementing act under the NIS2 Directive&lt;/a&gt; with general an detailed comments&lt;/div&gt;&lt;p&gt;&lt;b&gt;&lt;a href=&quot;https://data.consilium.europa.eu/doc/document/PE-100-2023-INIT/en/pdf&quot;&gt;EU Cyber Resilience Act&lt;/a&gt;&amp;nbsp;(CRA)&lt;/b&gt;:&amp;nbsp;&lt;a href=&quot;https://www.consilium.europa.eu/en/press/press-releases/2024/10/10/cyber-resilience-act-council-adopts-new-law-on-security-requirements-for-digital-products/&quot;&gt;adopted&lt;/a&gt;&amp;nbsp;by the Council in Oct 24, on security requirements for &quot;products with digital elements&quot; (&lt;b&gt;&lt;i&gt;software&amp;nbsp;&lt;/i&gt;&lt;/b&gt;or hardware products&amp;nbsp;&lt;b&gt;&lt;i&gt;and&amp;nbsp;&lt;/i&gt;&lt;/b&gt;their&amp;nbsp;&lt;b&gt;&lt;i&gt;remote data processing solutions&lt;/i&gt;&lt;/b&gt;, including software or hardware components being placed on the market separately). NB&amp;nbsp;&quot;remote data processing&quot; as defined could catch some&amp;nbsp;&lt;b&gt;&lt;i&gt;cloud&lt;/i&gt;&lt;/b&gt;&amp;nbsp;servces. Applicable&amp;nbsp;&lt;b&gt;&lt;i&gt;36 months&lt;/i&gt;&lt;/b&gt;&amp;nbsp;after CRA becomes effective (should be published in OJ in a few weeks), with some transitional provisions.&amp;nbsp; Views that the CRA is an &quot;&lt;a href=&quot;https://www.lawfaremedia.org/article/the-cyber-resilience-act--an-accidental-european-alien-torts-statute&quot;&gt;accidental European alien torts statute&lt;/a&gt;&quot;! Separately, the US CISA/FBI have &lt;a href=&quot;https://www.cisa.gov/news-events/alerts/2024/10/16/cisa-and-fbi-release-joint-guidance-product-security-bad-practices-public-comment&quot;&gt;published&lt;/a&gt; for consultation &lt;a href=&quot;https://www.cisa.gov/resources-tools/resources/product-security-bad-practices&quot;&gt;draft guidance on product security bad practices&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://data.consilium.europa.eu/doc/document/PE-7-2024-INIT/en/pdf&quot;&gt;&lt;b&gt;Revised EU Product Liability Directive&lt;/b&gt;&lt;/a&gt;:&amp;nbsp;&lt;a href=&quot;https://www.consilium.europa.eu/en/press/press-releases/2024/10/10/eu-brings-product-liability-rules-in-line-with-digital-age-and-circular-economy/&quot;&gt;adopted&lt;/a&gt;&amp;nbsp;by the Council in Oct 24, see some&amp;nbsp;&lt;a href=&quot;https://blog.kuan0.com/2024/10/things-cyber-security-summer-sept-2024.html#:~:text=Revised%20EU%20Product%20Liability%20Directive&quot;&gt;previous blog commentary&lt;/a&gt;&amp;nbsp;on&amp;nbsp;&lt;b&gt;&lt;i&gt;software/SaaS&lt;/i&gt;&lt;/b&gt;&amp;nbsp;being caught, and defects including&amp;nbsp;&lt;b&gt;&lt;i&gt;cybersecurity&lt;/i&gt;&lt;/b&gt;&amp;nbsp;issues. Liability on repairers, compensation claims easier for claimants, importers/EU representatives can be liable for products of non-EU manufacturers.&amp;nbsp;&lt;b&gt;&lt;i&gt;2-year&lt;/i&gt;&lt;/b&gt;&amp;nbsp;transposition period after it becomes effective (should be published in the OJ soon).&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-13726-2024-REV-1/en/pdf&quot;&gt;&lt;b&gt;EU CSAM Regulation&lt;/b&gt;&lt;/a&gt;: recently revived by the Council&#39;s Hungarian presidency which suggested the amended compromise text. Remember, this would catch&amp;nbsp;&lt;b&gt;&lt;i&gt;online service providers&lt;/i&gt;&lt;/b&gt;, such as providers of hosting services and interpersonal communications services. Currently this would apply&amp;nbsp;&lt;b&gt;&lt;i&gt;24 months&lt;/i&gt;&lt;/b&gt;&amp;nbsp;from its effective date. (The previous temporary derogation from the ePrivacy Directive to allow scanning for CSAM was&amp;nbsp;&lt;a href=&quot;https://eur-lex.europa.eu/eli/reg/2024/1307/oj&quot;&gt;extended&lt;/a&gt;&amp;nbsp;to 3 Apr 2026, in Apr 24.)&lt;/p&gt;&lt;p&gt;&lt;b&gt;UK Product &amp;amp; Metrology Bill&lt;/b&gt;: the Delegated Powers and Regulatory Reform Committee&amp;nbsp;&lt;a href=&quot;https://bills.parliament.uk/Publications/56400/Documents/5159&quot;&gt;has reservations&lt;/a&gt;, see my previous comments&amp;nbsp;&lt;a href=&quot;https://www.linkedin.com/posts/wkhon_product-regulation-and-metrology-bill-hl-activity-7238243728983830528-3kPx&quot;&gt;on LinkedIn&lt;/a&gt;&amp;nbsp;including that things are mostly left to delegated legislation.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Backdoors?&lt;/b&gt;: but, note that any encryption/other backdoors into apps/products/networks, or special keys &quot;only&quot; for government access, will threaten&amp;nbsp;&lt;b&gt;&lt;i&gt;everyone&#39;s&lt;/i&gt;&lt;/b&gt;&amp;nbsp;security (as&amp;nbsp;&lt;a href=&quot;https://www.globalencryption.org/2024/10/celebrating-your-digital-privacy-on-global-encryption-day/&quot;&gt;noted&lt;/a&gt;&amp;nbsp;regarding Global Encryption Day, 21 Oct 2024!). Example: &lt;a href=&quot;https://www.reuters.com/technology/cybersecurity/chinese-hackers-breached-us-court-wiretap-systems-wsj-reports-2024-10-06/&quot;&gt;it&lt;/a&gt; &lt;a href=&quot;https://www.wsj.com/tech/cybersecurity/u-s-wiretap-systems-targeted-in-china-linked-hack-327fc63b&quot;&gt;seems&lt;/a&gt; Chinese hackers got into US broadband providers&#39; networks and acquired information &quot;from systems the federal government uses for court-authorized wiretapping&quot;.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Passkeys&lt;/b&gt;: more secure than passwords (see my&amp;nbsp;&lt;a href=&quot;https://bit.ly/hontechbookleaflet&quot;&gt;book&amp;nbsp;&lt;/a&gt;&amp;amp;&amp;nbsp;&lt;a href=&quot;https://bit.ly/hontechbookpdf&quot;&gt;free PDF&lt;/a&gt;!), it&#39;s great that this &quot;passwordless&quot; option is increasingly being adopted, and increasingly interoperable cross-platform: see&amp;nbsp;&lt;a href=&quot;https://blogs.windows.com/windowsdeveloper/2024/10/08/passkeys-on-windows-authenticate-seamlessly-with-passkey-providers/&quot;&gt;passkeys on Windows&lt;/a&gt;, and&amp;nbsp;&lt;a href=&quot;https://blog.google/technology/safety-security/google-password-manager-passkeys-update-september-2024/&quot;&gt;Google&#39;s passkey syncing&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Ransomware, sanctions&lt;/b&gt;: individuals with links to Russian state and other prolific ransomware groups, including LockBit, have been found and sanctioned. NCA&amp;nbsp;&lt;a href=&quot;https://www.nationalcrimeagency.gov.uk/news/further-evil-corp-cyber-criminals-exposed-one-unmasked-as-lockbit-affiliate&quot;&gt;news&lt;/a&gt;;&amp;nbsp;&lt;a href=&quot;https://www.nationalcrimeagency.gov.uk/who-we-are/publications/732-evil-corp-behind-the-screens/file&quot;&gt;history of Evil Corp&lt;/a&gt;&amp;nbsp;(not on technical matters)&lt;/p&gt;&lt;p&gt;&lt;b&gt;Software bill of materials (SBOM)&lt;/b&gt;: more from the US NIST e.g. on &lt;a href=&quot;https://www.cisa.gov/resources-tools/resources/framing-software-component-transparency-2024&quot;&gt;framing software component transparency&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://www.cisa.gov/sbom&quot;&gt;what&#39;s SBOM?&lt;/a&gt;&amp;nbsp;&lt;a href=&quot;https://www.cisa.gov/sites/default/files/2024-07/SBOM%20FAQ%202024.pdf&quot;&gt;CISA FAQ&lt;/a&gt;, &lt;a href=&quot;https://www.cisa.gov/topics/cyber-threats-and-advisories/sbom/sbomresourceslibrary&quot;&gt;resources&lt;/a&gt;, &lt;a href=&quot;https://www.cisa.gov/resources-tools/resources/software-transparency-saas-environments-0&quot;&gt;SBOM in SaaS/cloud&lt;/a&gt;, &lt;a href=&quot;https://www.cisa.gov/resources-tools/resources/guidance-assembling-group-products&quot;&gt;SBOM for assembled group of products&lt;/a&gt;. SBOM is explained in my book). I do feel &lt;b&gt;&lt;i&gt;contracts &lt;/i&gt;&lt;/b&gt;should include SBOM provisions.&lt;/p&gt;&lt;p&gt;&lt;b&gt;IoT&lt;/b&gt;:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;ETSI&amp;nbsp;&lt;a href=&quot;https://www.etsi.org/deliver/etsi_en/303600_303699/303645/03.01.03_60/en_303645v030103p.pdf&quot;&gt;Cyber Security for Consumer Internet of Things: Baseline Requirements&lt;/a&gt;&amp;nbsp;updated to v3.1.3, Sept 24 version.&lt;/li&gt;&lt;li&gt;Joint Guidance on Principles of OT Cybersecurity for Critical Infrastructure Organizations ASD’s ACSC, CISA, FBI, NSA, and International Partners &lt;a href=&quot;https://www.cisa.gov/news-events/alerts/2024/10/01/asds-acsc-cisa-fbi-nsa-and-international-partners-release-guidance-principles-ot-cybersecurity &quot;&gt;published&lt;/a&gt;: &lt;a href=&quot;https://www.cyber.gov.au/sites/default/files/2024-10/principles_of_operational_technology_cyber_security.pdf&quot;&gt;Principles of operational technology cyber security&lt;/a&gt;.&amp;nbsp;&quot;The six principles outlined in this guide are intended to aid organizations in identifying how business decisions may adversely impact the cybersecurity of OT and the specific risks associated with those decisions.&quot;&amp;nbsp;&lt;/li&gt;&lt;li&gt;If you use an iPhone/iPad: &lt;a href=&quot;https://scotthelme.co.uk/ios-18-quick-tips-security-edition/&quot;&gt;great tips&lt;/a&gt; from security expert Scott Helme&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;UK NCSC guidance&lt;/b&gt;:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;for lawyers,&amp;nbsp;&lt;a href=&quot;https://www.ncsc.gov.uk/guidance/cyber-security-tips-for-barristers-solicitors-and-legal-professionals&quot;&gt;cybersecurity tips&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://www.ncsc.gov.uk/files/Cyber-security-tips-for-barristers.pdf&quot;&gt;PDF&lt;/a&gt;), the usual basics - backups, software updates, encryption, strong passwords &amp;amp; 2FA/MFA, device access control, firewall, limit admin accounts, use antivirus, control/track/lock stolen/lost devices, app permissions&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.ncsc.gov.uk/blog-post/not-all-types-mfa-created-equal&quot;&gt;updated&lt;/a&gt;&amp;nbsp;guidance on &lt;a href=&quot;https://www.ncsc.gov.uk/collection/mfa-for-your-corporate-online-services/why-mfa-matters&quot;&gt;multi-factor authentication (MFA)&lt;/a&gt;, emphasising that authenticating users to &lt;b&gt;&lt;i&gt;cloud-based &lt;/i&gt;&lt;/b&gt;corporate services using a password alone is &lt;b&gt;&lt;i&gt;not &lt;/i&gt;&lt;/b&gt;strong enough to protect any sensitive data;&amp;nbsp;only promp for authentication or MFA when it makes a difference (tell that to law firms, please!), and anti-patterns that undermine or make MFA worse&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.ncsc.gov.uk/blog-post/how-to-talk-to-board-members-about-cyber&quot;&gt;how to talk to Boards about cyber&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.ncsc.gov.uk/guidance/effective-communications-in-a-cyber-incident&quot;&gt;effective communications in a cyber incident&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Microsoft, Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA)&lt;/b&gt;&amp;nbsp;&lt;a href=&quot;https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/fy25-cam-be-cybersmart-kit-2024-09-16.pdf?ocid=cmmax7iigcf&quot;&gt;Be Cybersmart Kit&lt;/a&gt; for Cybersecurity Awareness Month (which is October) also &lt;a href=&quot;https://www.microsoft.com/en-us/security/blog/2024/10/01/cybersecurity-awareness-month-securing-our-world-together/&quot;&gt;focuses &lt;/a&gt;on the basics: use strong passwords and consider a password manager; turn on MFA; learn to recognize and report phishing; keep software updated.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Quantum tech&lt;/b&gt;:&amp;nbsp;&lt;a href=&quot;https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/10/preparing-for-the-quantum-enabled-future/&quot;&gt;ICO views&lt;/a&gt;; UK government response on&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/government/publications/regulating-quantum-technology-applications-government-response-to-recommendations-made-by-the-regulatory-horizons-council/regulating-quantum-technology-applications-government-response-to-the-rhc&quot;&gt;regulating quantum applications&lt;/a&gt;; cybersecurity risks from quantum computing and steps for financial authorities and institutions (&lt;a href=&quot;https://www.gov.uk/government/news/g7-cyber-expert-group-recommends-action-to-combat-financial-sector-risks-from-quantum-computing&quot;&gt;see&lt;/a&gt; the &lt;a href=&quot;https://assets.publishing.service.gov.uk/media/6710f86e9cd657734653d713/G7-CYBER-EXPERT-GROUP-STATEMENT-PLANNING-OPPORTUNITIES-RISKS-QUANTUM-COMPUTING.pdf&quot;&gt;G7 Cyber Expert Group statement on planning for the opportunities and risks of quantum computing&lt;/a&gt;)&lt;/p&gt;&lt;p&gt;&lt;b&gt;US &amp;amp; transfers&lt;/b&gt;:&amp;nbsp;&lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=COM:2024:451:FIN&quot;&gt;Commission&#39;s report&lt;/a&gt;&amp;nbsp;on the first periodic review of the functioning of the adequacy decision on the EU-US Data Privacy Framework (DPF). Separately, industry body CCIA&#39;s comments on digital trade barriers affecting US companies include, &lt;a href=&quot;https://ccianet.org/news/2024/10/ccia-outlines-digital-trade-barriers-in-comments-for-ustr/&quot;&gt;for the EU&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://ccianet.org/wp-content/uploads/2024/10/CCIA_2024-NTE-Digital-Trade-Barriers-EU.pdf&quot;&gt;detailed PDF&lt;/a&gt;), data and infrastructure localization mandates and restrictions on cloud services (citing e.g. the EUCS, NIS2, Data Act), and restrictions on cross-border data flows (under not just GDPR but also the Data Act and Data Governance Act)&lt;/p&gt;&lt;p&gt;&lt;b&gt;Other ICO&lt;/b&gt;:&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;p&gt;&lt;/p&gt;&lt;li&gt;Levales solicitors &lt;a href=&quot;https://ico.org.uk/action-weve-taken/enforcement/levales-solicitors-llp/&quot;&gt;reprimand&lt;/a&gt;: &quot;A threat actor accessed Levales’ &lt;b&gt;&lt;i&gt;cloud-based server&lt;/i&gt;&lt;/b&gt; using &lt;b&gt;&lt;i&gt;legitimate credentials&lt;/i&gt;&lt;/b&gt; and subsequently published data on the dark web&quot;. Levales &quot;did not have &lt;b&gt;&lt;i&gt;Multi-Factor Authentication (MFA)&lt;/i&gt;&lt;/b&gt; in place for the affected domain account. Levales relied on computer prompts for the management and strength of password and &lt;b&gt;&lt;i&gt;did not have a password policy&lt;/i&gt;&lt;/b&gt; in place at the time of the incident. The threat actor was able to gain access to the administrator level account via compromised account credentials. Levales Solicitors LLP have not been able to confirm how these were obtained.&quot; And see above, NCSC and cybersecurity awareness month guidance reiterating the importance of using MFA, especially for cloud!&lt;/li&gt;&lt;li&gt;New&amp;nbsp;&lt;a href=&quot;https://ico.org.uk/for-organisations/advice-and-services/audits/data-protection-audit-framework/&quot;&gt;data protection audit framework&lt;/a&gt;&amp;nbsp;&lt;a href=&quot;https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/10/new-data-protection-audit-framework-launched/&quot;&gt;launched&lt;/a&gt;, including toolkits (on areas like&amp;nbsp;&lt;a href=&quot;https://ico.org.uk/for-organisations/advice-and-services/audits/data-protection-audit-framework/toolkits/information-and-cyber-security/&quot;&gt;security&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://ico.org.uk/for-organisations/advice-and-services/audits/data-protection-audit-framework/toolkits/personal-data-breach-management/&quot;&gt;personal data breach detection/prevention&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://ico.org.uk/for-organisations/advice-and-services/audits/data-protection-audit-framework/toolkits/artificial-intelligence/&quot;&gt;AI&lt;/a&gt;), framework trackers (similar areas), resources, case studies&lt;/li&gt;&lt;li&gt;From 11 Oct 24, businesses must&amp;nbsp;&lt;a href=&quot;https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/10/changes-to-our-services-for-businesses/&quot;&gt;try online resources&lt;/a&gt;&amp;nbsp;&quot;Instead of first calling our phone line...&quot; - will the &lt;a href=&quot;https://blog.kuan0.com/2024/10/#:~:text=Data%20protection%20fee%3A&quot;&gt;expected increase&lt;/a&gt; in the data protection fee change this?&lt;/li&gt;&lt;li&gt;&lt;u&gt;Children&#39;s data&lt;/u&gt;: ICO&#39;s further&amp;nbsp;&lt;a href=&quot;https://ico.org.uk/about-the-ico/ico-and-stakeholder-consultations/ico-consultation-on-the-children-s-code-strategy-call-for-evidence/&quot;&gt;short consultation&lt;/a&gt;&amp;nbsp;on its Children&#39;s Code (on use of children’s personal information in&amp;nbsp;&lt;b&gt;&lt;i&gt;recommender systems&lt;/i&gt;&lt;/b&gt;, use of PD of children &amp;lt;13) has closed, sorry I didn&#39;t have time to blog it earlier this month&lt;/li&gt;&lt;li&gt;&lt;u&gt;Cyber investigations/incidents&lt;/u&gt;: latest datasets, for Q1 24/25&amp;nbsp;&lt;a href=&quot;https://ico.org.uk/about-the-ico/our-information/complaints-and-concerns-data-sets/cyber-investigations/&quot;&gt;published&lt;/a&gt;&lt;/li&gt;&lt;li&gt;ICO &lt;a href=&quot;https://ico.org.uk/media/about-the-ico/disclosure-log/4031304/ic-329844-f1f8-response1.pdf&quot;&gt;DPIA for its use of Canva&lt;/a&gt; - interestingly, here as in some other FOI responses, the ICO redacted internal tech info like, in this case, detailed links: &quot;The disclosure of extended links reveals the ‘make up’ of our SharePoint system. Due to the nature of information this reveals, this information increases our vulnerability to cyber attacks.&quot;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Is &lt;b&gt;&lt;i&gt;security by obscurity&lt;/i&gt;&lt;/b&gt; really the best approach here? Previously, when asked for a &quot;list of all the variable names in the database, together with any descriptive/user guides of the variable names in the database list of all the variable names in the database, together with any descriptive/user guides of the variable names in the database&quot; for the ICO&#39;s database of data security incident trends, the ICO refused, &lt;a href=&quot;https://ico.org.uk/media/about-the-ico/disclosure-log/4030528/ic-319358-x4s1-response.pdf&quot;&gt;saying&lt;/a&gt; &quot;if disclosed, such information could be used by malicious actors seeking criminal access to our information and systems&quot;. It even &lt;a href=&quot;https://webarchive.nationalarchives.gov.uk/ukgwa/20230201161638/https://ico.org.uk/media/about-the-ico/disclosure-log/4018919/ic-66648-d3f4.pdf&quot;&gt;took the view&lt;/a&gt; that &quot;The size of our internal security team is exempt from disclosure to you under section 31(1)(a) of the FOIA, as it could make the ICO more vulnerable to crime&quot;.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;Facial recognition:&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Facewatch investigation &lt;a href=&quot;https://ico.org.uk/about-the-ico/our-information/disclosure-log/ic-331345-y5n0/&quot;&gt;FOI&lt;/a&gt;, unfortunately &lt;a href=&quot;https://ico.org.uk/media/about-the-ico/disclosure-log/4031293/ic-331345-y5n0-facewatch-letter-redacted.pdf&quot;&gt;ICO&#39;s letter to Facewatch&lt;/a&gt; was heavily redacted, surely it would be useful for others to see what actions Facewatch took or would take, and further actions recommended, that resulted in the ICO not pursuing Facewatch?&lt;/li&gt;&lt;li&gt;ICO &lt;a href=&quot;https://ico.org.uk/media/about-the-ico/disclosure-log/4031281/ic-329373-l4s8-disclosure.pdf&quot;&gt;letter to Parliamentarians&lt;/a&gt; on facial recognition and biometrics&lt;/li&gt;&lt;li&gt;(Separately, &lt;a href=&quot;https://www.thestack.technology/national-crime-agency-reveals-facial-recognition-plans/&quot;&gt;UK National Crime Agency&#39;s facial recognition plans&lt;/a&gt;)&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;a href=&quot;https://ico.org.uk/action-weve-taken/the-icos-work-to-recover-fines/#courtorders&quot;&gt;One court order&lt;/a&gt;&amp;nbsp;for winding-up (liquidation) on ICO petition in Q2 24/25, wonder who?&lt;/li&gt;&lt;p&gt;&lt;/p&gt;&lt;/ul&gt;&lt;p&gt;&lt;b&gt;Cyber Security Breaches Survey&lt;/b&gt;&amp;nbsp;(UK, annual): how could this be developed and improved? DSIT&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/government/calls-for-evidence/cyber-security-breaches-survey-user-engagement-exercise&quot;&gt;call for views&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://www.gov.uk/government/calls-for-evidence/cyber-security-breaches-survey-user-engagement-exercise/survey-questions-cyber-security-breaches-survey-user-engagement-exercise&quot;&gt;survey questions&lt;/a&gt;), deadline 23:59, 4 Nov 24.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Cloud&lt;/b&gt;: NIST&#39;s&amp;nbsp;&lt;a href=&quot;https://csrc.nist.gov/pubs/ir/8505/final&quot;&gt;A Data Protection Approach for Cloud-Native Applications&lt;/a&gt;&amp;nbsp;(note: here &quot;data protection&quot; means protecting&amp;nbsp;&lt;b&gt;&lt;i&gt;all&amp;nbsp;&lt;/i&gt;&lt;/b&gt;types of data, not just personal data), and see NCSC on MFA and cloud&lt;/p&gt;&lt;p&gt;&lt;b&gt;UN Cybercrime Convention&lt;/b&gt;: concerns&amp;nbsp;&lt;a href=&quot;https://www.statewatch.org/news/2024/october/european-data-protection-authorities-urged-to-take-action-on-new-cybercrime-convention/&quot;&gt;continue&lt;/a&gt;&amp;nbsp;to be raised (see other critiques summarised in &lt;a href=&quot;https://bit.ly/hontechbookleaflet&quot;&gt;my book&lt;/a&gt; and &lt;a href=&quot;https://bit.ly/hontechbookpdf&quot;&gt;free PDF&lt;/a&gt;).&lt;/p&gt;&lt;p&gt;&lt;b&gt;Adtech&lt;/b&gt;: the IAB has &lt;a href=&quot;https://iabeurope.eu/iab-europe-publishes-repository-of-european-iabs-initiatives/&quot;&gt;published&lt;/a&gt; its&amp;nbsp;&lt;a href=&quot;https://iabeurope.eu/wp-content/uploads/Repository-of-European-IABs-Initiatives-for-Responsible-Digital-Advertising-2024.pdf&quot;&gt;Repository of European IAB’s Initiatives for Responsible Digital Advertising&lt;/a&gt;&amp;nbsp;with helpful links to its key docs on data protection, DSA etc. It also published, for consultation, a proposed privacy-centric&amp;nbsp;&lt;a href=&quot;https://iabtechlab.com/admap/&quot;&gt;Attribution Data Matching Protocol (ADMaP)&lt;/a&gt;, a data clean room interoperability protocol for attribution measurement (&lt;a href=&quot;https://iabtechlab.com/wp-content/uploads/2024/10/ADMAP-Version-1.0-for-PUBLIC-COMMENT.pdf&quot;&gt;tech specs&lt;/a&gt;)&amp;nbsp;&quot;that enables advertisers and publishers to measure attributions using Privacy Enhancing Technologies (PETs) in a&amp;nbsp; Data Clean Room (DCR) and protecting their user’s Personal Identifiable Information&quot;.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;b&gt;GDPR non-material damage&lt;/b&gt;: &lt;a href=&quot;https://curia.europa.eu/juris/document/document.jsf?text=&amp;amp;docid=290709&amp;amp;pageIndex=0&amp;amp;doclang=EN&quot;&gt;CJEU case&lt;/a&gt;, reiterating that mere GDPR infringement isn&#39;t damage, but an apology could be sufficient compensation if previous position can&#39;t be restored, as long as it&#39;s full compensation; controller attitude/motivation irrelevant in awarding smaller compensation than the damage suffered. (I&#39;d add, an apology is &lt;b&gt;&lt;i&gt;not&lt;/i&gt;&lt;/b&gt; full compensation without a binding promise not to do something similar again in future!)&lt;/p&gt;&lt;p&gt;&lt;b&gt;GDPR Procedural Regulation&lt;/b&gt;:&amp;nbsp;&lt;a href=&quot;https://www.edpb.europa.eu/system/files/2024-10/edpb_statement_20241007_additionalproceduralrulesgdprenforcement_en_0.pdf&quot;&gt;EDPB statement&lt;/a&gt;; the Council&#39;s Data Protection Working Party will be &lt;a href=&quot;https://data.consilium.europa.eu/doc/document/CM-4567-2024-INIT/en/pdf&quot;&gt;discussing&lt;/a&gt; the draft Regulation on 24 Oct 24.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Digital identity&lt;/b&gt;:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;https://www.g7italy.it/wp-content/uploads/1728922911-g7-mapping-exercise-of-digital-identity-approaches.pdf&quot;&gt;G7 mapping exercise of digital identity approaches&lt;/a&gt; (&lt;a href=&quot;https://www.gov.uk/government/publications/g7-ministerial-declaration-cernobbio-italy-15-october-2024/g7-ministerial-declaration-15-october-2024&quot;&gt;ministerial declaration&lt;/a&gt;)&lt;/li&gt;&lt;li&gt;Note &lt;a href=&quot;https://ec.europa.eu/commission/presscorner/detail/en/ip_24_5047&quot;&gt;proposed&lt;/a&gt; EU regulations on &lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A52024PC0671&quot;&gt;digital identity cards&lt;/a&gt; and &lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52024PC0670&quot;&gt;passports/travel documents&lt;/a&gt; under the European &lt;a href=&quot;https://eur-lex.europa.eu/eli/reg/2024/1183/oj&quot;&gt;Digital Identity Framework Regulation (EIDAS2)&lt;/a&gt;, that amended the &lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv%3AOJ.L_.2014.257.01.0073.01.ENG&quot;&gt;EIDAS Regulation&lt;/a&gt;; initiatives are &lt;a href=&quot;https://www.europarl.europa.eu/news/en/press-room/20240223IPR18095/meps-back-plans-for-an-eu-wide-digital-wallet&quot;&gt;proceeding &lt;/a&gt;to build &lt;a href=&quot;https://ec.europa.eu/digital-building-blocks/sites/display/EUDIGITALIDENTITYWALLET/EU+Digital+Identity+Wallet+Home&quot;&gt;EU digital identity/EUDI wallets&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://ec.europa.eu/digital-building-blocks/sites/display/EUDIGITALIDENTITYWALLET/Technical+Specifications&quot;&gt;tech specs&lt;/a&gt;, but why not &quot;digital identity purses/handbags&quot;, I ask?!), with EU security agency ENISA having been &lt;a href=&quot;https://www.enisa.europa.eu/news/eu-digital-identity-wallet-a-leap-towards-secure-and-trusted-electronic-identification-through-certification&quot;&gt;requested&lt;/a&gt;&amp;nbsp;to support the certification of EUDI Wallets, including the &lt;a href=&quot;https://certification.enisa.europa.eu/about-eu-certification/developing-certification-schemes_en&quot;&gt;development&lt;/a&gt; of a candidate European cybersecurity certification scheme under the &lt;a href=&quot;https://eur-lex.europa.eu/eli/reg/2019/881/oj&quot;&gt;Cybersecurity Act&lt;/a&gt;. ENISA is now&amp;nbsp;&lt;a href=&quot;https://www.enisa.europa.eu/news/call-for-experts-join-the-enisa-ad-hoc-working-group-on-eu-digital-identity-wallets-cybersecurity-certification&quot;&gt;calling&lt;/a&gt; for experts to join its ad hoc working group for such certification, deadline 18 Nov 24.&lt;/li&gt;&lt;li&gt;NIST is consulting on &lt;a href=&quot;https://csrc.nist.gov/pubs/ir/8480/ipd&quot;&gt;Attribute Validation Services for Identity Management: Architecture, Security, Privacy, and Operational Considerations&lt;/a&gt;&amp;nbsp;(e.g. validating age&amp;gt;18), deadline 8 Nov 24&lt;/li&gt;&lt;li&gt;Biometrics, facial recognition - see &lt;a href=&quot;https://www.dataprotection.ie/en/news-media/press-releases/data-protection-commission-launches-inquiry-ryanairs-customer-verification-process&quot;&gt;Irish DPC&#39;s investigation&lt;/a&gt; into biometrics for customer verification.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;div&gt;&lt;b&gt;Other EDPB&lt;/b&gt;:&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;https://www.edpb.europa.eu/news/news/2024/edpb-adopts-opinion-processors-guidelines-legitimate-interest-statement-draft_en&quot;&gt;Adopted&lt;/a&gt; a raft of docs including&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://www.edpb.europa.eu/system/files/2024-10/edpb_opinion_202422_relianceonprocessors-sub-processors_en.pdf&quot;&gt;Opinion 22/2024 on certain obligations following from the reliance on processor(s) and sub-processor(s)&lt;/a&gt;, produced on the Danish SA&#39;s request (industry association BSA has &lt;a href=&quot;https://www.bsa.org/news-events/news/bsa-raises-concerns-over-edpb-opinion-on-sub-processors&quot;&gt;raised concerns&lt;/a&gt; that these requirements are at odds with market practice, supply chain relationships, etc.)&lt;/li&gt;&lt;li&gt;For consultation,&amp;nbsp;&lt;a href=&quot;https://www.edpb.europa.eu/system/files/2024-10/edpb_guidelines_202401_legitimateinterest_en.pdf&quot;&gt;Guidelines 1/2024 on processing of personal data based on Article 6(1)(f) GDPR&lt;/a&gt;, deadline 20 Nov 24&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Note: I&#39;ve not read properly but there&#39;s at least one oddity. The cases the EDPB relied on to argue that &lt;b&gt;&lt;i&gt;personalised advertising&lt;/i&gt;&lt;/b&gt; is &quot;direct marketing&quot; don&#39;t actually say that. &quot;However, CJEU case law suggests that personalised advertising could be considered a form of direct marketing&quot; - well no, the &lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A62021CJ0252#point115&quot;&gt;para referenced&lt;/a&gt;&amp;nbsp;stated processing for direct marketing may be for legitimate interests, not that personalised ads are direct marketing! Similarly, arguments about &quot;communications&quot; being for direct marketing skate over the &lt;a href=&quot;https://curia.europa.eu/juris/document/document.jsf?text=&amp;amp;docid=250043&amp;amp;pageIndex=0&amp;amp;doclang=EN&quot;&gt;case cited&lt;/a&gt;&amp;nbsp;clearly being about &quot;electronic mail&quot; as defined in the &lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A02002L0058-20091219&quot;&gt;ePrivacy Directive&lt;/a&gt;. I think we&#39;d all agree that ads in emails are direct marketing, but the EDPB seems to be arguing that, under that case,&amp;nbsp;&lt;b&gt;&lt;i&gt;all&lt;/i&gt;&lt;/b&gt;&amp;nbsp;commercial communications like personalised ads are direct marketing. This&amp;nbsp;&lt;b&gt;&lt;i&gt;can&#39;t&lt;/i&gt;&lt;/b&gt; follow from that case, which is clearly &lt;a href=&quot;https://curia.europa.eu/juris/document/document.jsf?text=&amp;amp;docid=250043&amp;amp;pageIndex=0&amp;amp;doclang=EN#point47&quot;&gt;confined to&lt;/a&gt; &quot;communications covered by Article 13(1)&quot; of the ePrivacy Directive such as email.&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;a href=&quot;https://www.edpb.europa.eu/our-work-tools/our-documents/strategy-work-programme/edpb-work-programme-2024-2025_en&quot;&gt;Work programme 24-25&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.edpb.europa.eu/system/files/2024-10/20241009_letter-to-kosovan-dpa_en.pdf&quot;&gt;Granting&lt;/a&gt; Kosovan Information and Privacy Agency observer status for the EDPB&#39;s activities (contrast the polite No post-Brexit to the UK&#39;s then Information Commissioner, in a &lt;a href=&quot;https://www.edpb.europa.eu/sites/default/files/files/file1/out2020-0110edpb_reply_to_ico.pdf&quot;&gt;letter&lt;/a&gt;&amp;nbsp;whose reference, coincidentally or not, was &quot;OUT2020-0110&quot;!)&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.edpb.europa.eu/news/news/2024/cef-2025-edpb-selects-topic-next-years-coordinated-action_en&quot;&gt;Next coordinated enforcement action&lt;/a&gt;&amp;nbsp;in 2025 will be on &lt;b&gt;&lt;i&gt;erasure &lt;/i&gt;&lt;/b&gt;(right to be forgotten, RTBF)&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;Final &lt;a href=&quot;https://www.edpb.europa.eu/system/files/2024-10/edpb_guidelines_202302_technical_scope_art_53_eprivacydirective_v2_en_0.pdf&quot;&gt;Guidelines 2/2023 on Technical Scope of Art. 5(3) of ePrivacy Directive&lt;/a&gt; i.e. &quot;cookie&quot; consent but much more; local processing, like &lt;i&gt;&lt;b&gt;on-device processing&lt;/b&gt;&lt;/i&gt; for AI/machine learning, is still caught according to the EDPB, if anything is sent to the &quot;entity producing the client-side code&quot;. Small AI models that can &quot;fit&quot; on user devices are emerging, and may represent the only way forward for users who want AI applications on their phones, at this rate!&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.edpb.europa.eu/system/files/2024-10/edpb_letter_reply_com_position-paper-interplay_en.pdf&quot;&gt;Response&lt;/a&gt; to the European Commission concerning the EDPB work on the interplay between EU data protection and competition law (DMA etc.: still working on it!)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;For amusement value only:&lt;/b&gt;&amp;nbsp;ICO FOI response, non!&lt;/p&gt;&lt;ul&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://ico.org.uk/about-the-ico/our-information/disclosure-log/ic-330493-x2z5/&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;613&quot; data-original-width=&quot;893&quot; height=&quot;220&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhfd8c0Y5yy0OL4XOgUljokSIlxDshkXx71bykWqRkHUM8dx3H9pFyMqkXBfrvplxBtFlKUxQCbfVpkHrB9xz64H3vW5fSAmWLnttLxDCLjBfIrlctX0M65W5g_pp9tcmhp29P6iS4jF1iLqZRNpXlm6Bq1MDSOsWYGtBWxF5eb2GglunD8iu4qtnTq6ts&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/ul&gt;&lt;p&gt;(See also blog on &lt;a href=&quot;https://blog.kuan0.com/2024/10/things-ai-oct-2024.html&quot;&gt;AI&lt;/a&gt; and, just because,&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/government/speeches/attorney-generals-2024-bingham-lecture-on-the-rule-of-law&quot;&gt;UK Attorney-General&#39;s speech on the rule of law in an age of populism&lt;/a&gt;, &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/events/series-webinars-data-act-contracts&quot;&gt;Commission webinars&lt;/a&gt; on development of &lt;b&gt;&lt;i&gt;model or standard contractual terms&lt;/i&gt;&lt;/b&gt; for data sharing and switching between data processing services i.e. cloud services under the EU Data Act, and EU Digital Services Act&amp;nbsp;&lt;a href=&quot;https://algorithmic-transparency.ec.europa.eu/events/dsa-transparency-database-researcher-workshop-2024-10-25_en&quot;&gt;DSA transparency database researchers&#39; workshop&lt;/a&gt;)&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/5829639713957974579'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/5829639713957974579'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2024/10/data-protection-cyber-security-oct-2024.html' title='Data protection &amp; cyber security, Oct 2024'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEhfd8c0Y5yy0OL4XOgUljokSIlxDshkXx71bykWqRkHUM8dx3H9pFyMqkXBfrvplxBtFlKUxQCbfVpkHrB9xz64H3vW5fSAmWLnttLxDCLjBfIrlctX0M65W5g_pp9tcmhp29P6iS4jF1iLqZRNpXlm6Bq1MDSOsWYGtBWxF5eb2GglunD8iu4qtnTq6ts=s72-c" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-8957232088196139059</id><published>2024-10-06T15:59:00.002+01:00</published><updated>2024-10-06T17:04:22.380+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="adtech"/><category scheme="http://www.blogger.com/atom/ns#" term="AI"/><category scheme="http://www.blogger.com/atom/ns#" term="artificial intelligence"/><category scheme="http://www.blogger.com/atom/ns#" term="compensation"/><category scheme="http://www.blogger.com/atom/ns#" term="dark patterns"/><category scheme="http://www.blogger.com/atom/ns#" term="drcf"/><category scheme="http://www.blogger.com/atom/ns#" term="equality"/><category scheme="http://www.blogger.com/atom/ns#" term="facial recognition"/><category scheme="http://www.blogger.com/atom/ns#" term="GDPR"/><category scheme="http://www.blogger.com/atom/ns#" term="governance"/><category scheme="http://www.blogger.com/atom/ns#" term="ico"/><category scheme="http://www.blogger.com/atom/ns#" term="open-source"/><category scheme="http://www.blogger.com/atom/ns#" term="PAIR"/><category scheme="http://www.blogger.com/atom/ns#" term="processing"/><category scheme="http://www.blogger.com/atom/ns#" term="proxy data"/><category scheme="http://www.blogger.com/atom/ns#" term="PSNI"/><category scheme="http://www.blogger.com/atom/ns#" term="ransomware"/><category scheme="http://www.blogger.com/atom/ns#" term="transfers"/><category scheme="http://www.blogger.com/atom/ns#" term="UN Digital Compact"/><title type='text'>Things data protection / privacy (some AI), Sept/Oct 2024</title><content type='html'>&lt;p&gt;&lt;b&gt;GDPR Procedural Regulation&lt;/b&gt;: the Council seems to be &lt;a href=&quot;https://data.consilium.europa.eu/doc/document/CM-4402-2024-INIT/en/pdf&quot;&gt;progressing&lt;/a&gt;&amp;nbsp;this, in October 2024.&lt;/p&gt;&lt;p&gt;&lt;b&gt;CJEU cases&lt;/b&gt;: there have been several lately that others have covered, such as on &lt;a href=&quot;https://curia.europa.eu/juris/document/document.jsf?text=&amp;amp;docid=290688&amp;amp;pageIndex=0&amp;amp;doclang=EN&quot;&gt;commercial interests possibly being legitimate interests&lt;/a&gt;, so I won&#39;t for now. I just want to highlight a case from a few months back, which is relevant to &lt;a href=&quot;https://blog.kuan0.com/2024/10/gdpr-compensation-strict-liability.html&quot;&gt;employee policies and training/awareness-raising, and possible strict liability to pay compensation&lt;/a&gt; to data subjects, at least for infringements arising from employee action/inaction.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Adtech:&lt;/b&gt;&amp;nbsp;IAB Tech Lab &lt;a href=&quot;https://iabtechlab.com/tech-lab-release-pair-protocol-for-the-industry/&quot;&gt;has&lt;/a&gt;&amp;nbsp;&lt;a href=&quot;https://iabtechlab.com/press-releases/iab-tech-lab-introduces-pair-protocol-for-advertisers-and-publishers/&quot;&gt;launched&lt;/a&gt;, for public consultation, its &lt;a href=&quot;https://iabtechlab.com/pair/&quot;&gt;PAIR protocol 1.0&lt;/a&gt; for a &quot;privacy-centric approach for advertisers and publishers to match and activate their first-party audiences for advertising use cases &lt;i&gt;without&lt;/i&gt; relying on third-party cookies&quot;. Initially donated by Google, PAIR has been developed into &quot;an open standard that enables interoperability between data clean rooms and allows all DSPs to adopt the protocol for enhanced privacy-safe audience targeting&quot;.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Equality, AI&lt;/b&gt;:&amp;nbsp;&lt;a href=&quot;https://www.equalityhumanrights.com/guidance/public-sector-equality-duty-and-data-protection&quot;&gt;The public sector equality duty and data protection&lt;/a&gt;, Sept 2024, UK EHRC guidance (with ICO input), including helpful examples of &lt;b&gt;proxy data&lt;/b&gt; for protected characteristics under the UK Equality Act 2010, and a short section on &lt;b&gt;proxy analysis of AI models&lt;/b&gt;, with a case study on the Dutch benefit fraud scandal that led to unlawful discriminatinon (from using biased predictive algorithms).&lt;/p&gt;&lt;p&gt;&lt;b&gt;Open-source AI&lt;/b&gt;: from UK ICO&#39;s &lt;a href=&quot;https://ico.org.uk/for-organisations/advice-and-services/innovation-advice/previously-asked-questions/&quot;&gt;previously-asked questions&lt;/a&gt;, this Q&amp;amp;A was added recently even though currently the &quot;Last updated&quot; date indicates 11 April 2024.&lt;br /&gt;Q: We want to develop a speech transcription service for use in our organisation, using an open&lt;b&gt;-source artificial intelligence (AI) model&lt;/b&gt;. Can we do this even though we don’t have detailed information about how the model was trained? (see &lt;a href=&quot;https://ico.org.uk/for-organisations/advice-and-services/innovation-advice/previously-asked-questions/#AI:~:text=Answer%3A%C2%A0Data%20protection%20law%20does%20not%20prevent&quot;&gt;the answer&lt;/a&gt;! It seems call transcription is a popular use of AI, see other Q&amp;amp;A on that webpage on that topic, e.g. &lt;a href=&quot;https://ico.org.uk/for-organisations/advice-and-services/innovation-advice/previously-asked-questions/#:~:text=the%20organisation%20is%20developing%20products%20that%20can%20be%20used%20to%20create%20transcriptions%20from%20calls.&quot;&gt;this&lt;/a&gt; and &lt;a href=&quot;https://ico.org.uk/for-organisations/advice-and-services/innovation-advice/previously-asked-questions/#:~:text=the%20organisation%20is%20a%20supplier%20of%20AI%20software%20that%20generates%20call%20transcripts&quot;&gt;this&lt;/a&gt;. Also, compare a Danish SA decision from June 2024 on the use of AI to analyse recordings of phone calls.)&lt;/p&gt;&lt;p&gt;&lt;b&gt;Oral disclosures?&lt;/b&gt;: talking of contrasting approaches, compare a Polish SA decision &lt;a href=&quot;https://uodo.gov.pl/decyzje/DKN.5131.33.2023&quot;&gt;holding&lt;/a&gt; that oral disclosure of personal data during a press conference was &lt;i&gt;not&lt;/i&gt; in breach of GDPR, whereas an Icelandic SA decision &lt;a href=&quot;https://www.personuvernd.is/urlausnir/kvortun-yfir-vinnslu-personuupplysinga-af-halfu-starfsmanna-logreglunnar-a-hofudborgarsvaedinu&quot;&gt;ruled&lt;/a&gt; that oral disclosures by police under the Law Enforcement Directive infringed that Directive.Yes, different laws, but they ought to be interpreted consistently. And I don&#39;t get how oral statements amount to &quot;processing&quot; &lt;i&gt;wholly or partly by automated means&lt;/i&gt; under EU data protection laws, just as I don&#39;t get how there have been so many fines in the EU/UK regarding paper records without first holding that they form part of a &quot;&lt;a href=&quot;https://www.gdprinfo.info/#a4.6&quot;&gt;filing system&lt;/a&gt;&quot; as defined.&lt;/p&gt;&lt;p&gt;&lt;b&gt;ICO big PSNI fine&lt;/b&gt;: well-known by now (&lt;a href=&quot;https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/10/what-price-privacy-poor-psni-procedures-culminate-in-750k-fine/&quot;&gt;news release&lt;/a&gt;, &lt;a href=&quot;https://ico.org.uk/media/action-weve-taken/mpns/4031177/psni-penalty-notice.pdf&quot;&gt;MPN&lt;/a&gt;), but it underlines the point that the many &lt;i&gt;surnames&lt;/i&gt;&amp;nbsp;can be unique, and indicate religion and/or ethnicity (see Equality above on proxy data).&lt;/p&gt;&lt;p&gt;&lt;b&gt;ICO&lt;/b&gt;: selected recent &lt;a href=&quot;https://icosearch.ico.org.uk/s/search.html?collection=ico-meta&amp;amp;profile=disclosurelog&amp;amp;&amp;amp;query=&quot;&gt;ICO disclosures&lt;/a&gt;,&amp;nbsp;that the ICO decided to publish following FOI requests to it:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;How the ICO assesses &lt;b&gt;incidents / possible personal data breaches&lt;/b&gt;: ICO internal guidance (&lt;a href=&quot;https://ico.org.uk/about-the-ico/our-information/disclosure-log/ic-326444-z4z2/&quot;&gt;request&lt;/a&gt;, &lt;a href=&quot;https://ico.org.uk/media/about-the-ico/disclosure-log/4031093/ic-326444-z4z2-pdb-assessment-methodology-v11.pdf&quot;&gt;PDB assessment methodology&lt;/a&gt;&amp;nbsp;as of June 2023); seems to be based on &lt;a href=&quot;https://www.enisa.europa.eu/publications/dbn-severity/&quot;&gt;ENISA&#39;s risk assessment for PDBs&lt;/a&gt;, which is unsurprising as that has been endorsed by both EDPB and ICO&lt;/li&gt;&lt;li&gt;&lt;b&gt;Territorial scope&lt;/b&gt; under UK GDPR, DPA 2018: ICO internal guidance (&lt;a href=&quot;https://ico.org.uk/about-the-ico/our-information/disclosure-log/ic-327905-y2y5/&quot;&gt;request&lt;/a&gt;, &lt;a href=&quot;https://ico.org.uk/media/about-the-ico/disclosure-log/4031113/ic-327905-y2y5-knowledge-hub-territorial-scope.pdf&quot;&gt;copy&lt;/a&gt;)&lt;/li&gt;&lt;li&gt;What&#39;s a &lt;b&gt;restricted transfer&lt;/b&gt; outside the UK: ICO internal guidance (&lt;a href=&quot;https://ico.org.uk/about-the-ico/our-information/disclosure-log/ic-329148-z5n1/&quot;&gt;request&lt;/a&gt;, &lt;a href=&quot;https://ico.org.uk/media/about-the-ico/disclosure-log/4031109/ic-329148-z5n1-in-scope-what-counts-as-a-restricted-transfer.pdf&quot;&gt;copy&lt;/a&gt;); taking the outdated and misguided view that &quot;transfer&quot; is based on transfer of personal data&#39;s &lt;b&gt;physical location&lt;/b&gt;, which is at odds with the ICO&#39;s own &lt;a href=&quot;https://ico.org.uk/for-organisations/uk-gdpr-guidance-and-resources/international-transfers/international-transfers-a-guide/#data&quot;&gt;public guidance on transfers&lt;/a&gt;!&lt;/li&gt;&lt;li&gt;How does ICO decide &lt;b&gt;whether to publicise its intention to fine&lt;/b&gt; (&lt;a href=&quot;https://ico.org.uk/about-the-ico/our-information/disclosure-log/ic-325402-s9d7/&quot;&gt;request&lt;/a&gt;, &lt;a href=&quot;https://ico.org.uk/media/about-the-ico/disclosure-log/4031090/ic-325402-s9d7-decision-on-whether-to-publicise-the-fine-amount.pdf&quot;&gt;emails on decision&lt;/a&gt;, &lt;a href=&quot;https://ico.org.uk/media/about-the-ico/disclosure-log/4031091/ic-325402-s9d7-advanced-draft-press-release.pdf&quot;&gt;more info&lt;/a&gt;)? This was on one concrete situation, but it&#39;s helpful to know the factors, again unsurprising, which I summarise below:&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&amp;nbsp;ICO default posture of transparency, although it considers each circumstance.&lt;/li&gt;&lt;li&gt;This is consistent and fair with other similar cases where it has publicised the information at this stage.&lt;/li&gt;&lt;li&gt;For deterrence regarding perceived central provider issues: &quot;We are seeing a pattern of central providers having security issues with consequences for patients, publishing this will act as a learning/ deterrent for other processors with large central contracts, including the provisional fine will help clarify the seriousness of these issues&quot;.&lt;/li&gt;&lt;li&gt;&quot;The case has been extremely well reported and is well known, so this reduces the potential additional impact on the organisation and there is limited dispute about the facts of the attack.&quot;&lt;/li&gt;&lt;li&gt;&quot;Publishing the NOI [notice of intention to fine] and the provisional fine will help improve information rights practice and compliance among those we regulate.&quot;&lt;/li&gt;&lt;li&gt;While it is possible that the fine value will change, as it is &quot;provisional and subject to reps&quot;, this was balanced &quot;the possible criticism of the ICO for changing the fine amount as the process concludes vs. the benefit of being transparent about the process... Idemonstrating that, if it does change, that is proof that the ICO does consider reps carefully and takes action based upon reps. This can serve to increase confidence in and awareness of our processes. I am comfortable that, subject to including suitable language to make clear it is provisional, that this risk is managed and the benefit is greater.&quot;&lt;/li&gt;&lt;li&gt;&quot;in this case, I have decided that publicity at this point allows for &lt;b&gt;improved public protection from threat&lt;/b&gt; and hence is overridingly in the &lt;b&gt;public interest&lt;/b&gt;. It is also already in the &lt;b&gt;public domain&lt;/b&gt;.&quot;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p&gt;&lt;b&gt;DRCF&lt;/b&gt;: UK regulators the Digital Regulation Cooperation Forum are &lt;a href=&quot;https://www.drcf.org.uk/news-and-events/news/call-for-input-DRCF-workplan-2025-26/&quot;&gt;seeking input&lt;/a&gt; on their &lt;a href=&quot;https://www.drcf.org.uk/siteassets/drcf/pdf-files/call-for-input---drcf-workplan-2025-26.pdf?v=381604&quot;&gt;2025/26 workplan&lt;/a&gt;&amp;nbsp;by 8 Nov 2024. Unsurprisingly, the work includes AI, but also bilateral work on data protection and online safety, competition and data protection and illegal online financial promotions, and risks and opportunites of emerging technologies like digital identity, digital assets and synthetic media.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Data protection fee&lt;/b&gt;: The&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/government/consultations/data-protection-fee-regime-proposed-changes&quot;&gt;consultation&lt;/a&gt;&amp;nbsp;on increasing the UK data protection fee has closed. The ICO&#39;s own&amp;nbsp;&lt;a href=&quot;https://ico.org.uk/about-the-ico/consultations/dsit-consultation-on-the-proposed-changes-to-the-data-protection-fee-regime/&quot;&gt;response&lt;/a&gt;&amp;nbsp;supported the increase, but didn&#39;t advocate for any change in the bases for charging the fee, although the government was open to views on that, so it seems there will just be an increase in fee levels but no substantive changes to the bases.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Dark patterns&lt;/b&gt;: while not limited to data protection, see &lt;a href=&quot;https://www.oecd.org/en/blogs/2024/09/six-dark-patterns-used-to-manipulate-you-when-shopping-online.html&quot;&gt;OECD dark patterns on online shopping&lt;/a&gt;: countdown timers, hidden information, nagging, subscription traps, forced registration and privacy&amp;nbsp; intrusions, cancellation hurdles.&amp;nbsp;Not dissimilar to the issues previously raised by UK regulators ICO and CMA on online choice architecture, control over personal data and &lt;a href=&quot;https://www.drcf.org.uk/siteassets/drcf/pdf-files/harmful-design-in-digital-markets-ico-cma-joint-position-paper.pdf?v=380506&quot;&gt;harmful designs in digital markets&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Data transfers&lt;/b&gt; under the &lt;a href=&quot;https://www.un.org/techenvoy/global-digital-compact&quot;&gt;UN Digital Compact&lt;/a&gt;&amp;nbsp;(&quot;a comprehensive framework for global governance of digital technology and artificial intelligence&quot;): the text is a bit vague and general on cross-border data flows, and 2030 is not exactly near-term!:&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;46. Cross-border data flows are a critical driver of the digital economy. We recognize the potential social, economic and development benefits of secure and trusted cross-border data flows, in particular for micro-, small and medium-sized enterprises. We will identify innovative, interoperable and inclusive mechanisms to enable data to flow with trust within and between countries to mutual benefit, while respecting relevant data protection and privacy safeguards and applicable legal frameworks (SDG 17).&lt;/p&gt;47. We commit, &lt;b&gt;by 2030&lt;/b&gt;, to advance consultations among all relevant stakeholders to better understand commonalities, complementarities, convergence and divergence between regulatory approaches on how to facilitate cross-border data flows with trust so as to develop publicly available knowledge and best practices (SDG 17)...&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;p&gt;...We encourage the working group to report on its progress to the General Assembly, by no later than the eighty-first session, including on follow-up recommendations towards equitable and interoperable data governance arrangements, which may include fundamental principles of data governance at all levels as relevant for development; proposals to support interoperability between national, regional and international data systems; considerations of sharing the benefits of data; and &lt;b&gt;options to facilitate safe, secure and trusted data flows, including cross-border data flows as relevant for development&lt;/b&gt; (all SDGs).&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;But on data protection more broadly, &lt;b&gt;Objective 4. Advance responsible, equitable and interoperable data governance approaches&lt;/b&gt;, data privacy and security:&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;p&gt;&quot;We recognize that responsible and interoperable &lt;b&gt;data governance&lt;/b&gt; is essential to advance development objectives, protect human rights, foster innovation and promote economic growth. The increasing collection, sharing and processing of data, including in&amp;nbsp;&lt;b&gt;artificial intelligence systems&lt;/b&gt;, may amplify risks in the absence of effective personal data protection and privacy norms...&lt;/p&gt;...We commit,&amp;nbsp;&lt;b&gt;by 2030,&lt;/b&gt;&amp;nbsp;to: (a) Draw on existing international and regional guidelines on the protection of privacy in the development of data governance frameworks (all SDGs); (b) Strengthen support to all countries to develop effective and interoperable national data governance frameworks (all SDGs); (c) Empower individuals and groups with the&amp;nbsp;&lt;b&gt;ability to consider, give and withdraw their consent&lt;/b&gt;&amp;nbsp;to the use of their data and the ability to choose how those data are used, including through&amp;nbsp;&lt;b&gt;legally mandated protections for data privacy and intellectual property&lt;/b&gt;&amp;nbsp;(SDGs 10 and 16); (d) Ensure that data collection, access, sharing, transfer, storage and processing practices are safe, secure and proportionate for necessary, explicit and legitimate purposes, in compliance with international law (all SDGs); (e) Develop skilled workforces capable of collecting, processing, analysing, storing and transferring data safely in ways that protect privacy (SDGs 8 and 9).&lt;/blockquote&gt;&lt;p&gt;&lt;b&gt;Survey on attitudes and awareness of emerging technologies, data protection, and digital products&lt;/b&gt;: There was a &lt;a href=&quot;https://www.gov.uk/government/publications/attitudes-and-awareness-survey-2024&quot;&gt;recent government survey&lt;/a&gt; of the UK public on the level of adoption and awareness of blockchain and immersive virtual worlds, attitudes towards pricing on digital platforms and behaviours regarding personal data control.&amp;nbsp;But I can&#39;t yet find a summary of its outcomes, just the raw data.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Hungary&lt;/b&gt;: the Commission&#39;s decision to refer Hungary to the CJEU &lt;a href=&quot;https://ec.europa.eu/commission/presscorner/detail/en/ip_24_4865&quot;&gt;argues&lt;/a&gt;&amp;nbsp;that Hungary&#39;s national law on the Defence of Sovereignty is in breach of EU law, including the e-Commerce Directive, the Services Directive, as well as EU Data protection legislation.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Canada&lt;/b&gt;: if attacker accesses and encrypts data without exfiltration for ransom purposes, that is still considered a breach that &lt;a href=&quot;https://www.dentonsdata.com/ipc-trilogy-considering-encryption-based-non-extractive-cyber-attacks/?utm_medium=email&amp;amp;utm_medium=email&amp;amp;utm_campaign=Daily%20Dentons%20Data&amp;amp;utm_content=Daily%20Dentons%20Data+CID_cb8d13cd283c0c989b7b61fef0cc7ba9&amp;amp;utm_source=Campaign%20Monitor&amp;amp;utm_term=IPC%20Trilogy%20Considering%20Encryption-Based%20Non-Extractive%20Cyber%20Attacks&quot;&gt;must be notified to affected individuals&lt;/a&gt; under Ontario’s Personal Health Information Protection Act (PHIPA), and the Child, Youth and Family Services Act (CYFSA).&lt;/p&gt;&lt;p&gt;&lt;b&gt;Facial recognition &amp;amp; privacy / personal data&lt;/b&gt;: interesting and scary, &lt;a href=&quot;https://news.sky.com/story/students-adapt-metas-smart-glasses-to-dox-strangers-in-real-time-13227034&quot;&gt;students managed to adapt smart glasses&lt;/a&gt; to look up info on strangers in real-time, including parents&#39; names!&lt;/p&gt;&lt;p&gt;(Also please see my blogs last week on &lt;a href=&quot;https://blog.kuan0.com/2024/10/things-cyber-security-summer-sept-2024.html&quot;&gt;security&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href=&quot;https://blog.kuan0.com/2024/09/things-ai-sept-2024.html&quot;&gt;AI&lt;/a&gt;: both have also been updated with more Sept links.)&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/8957232088196139059'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/8957232088196139059'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2024/10/things-data-protection-privacy-some-ai.html' title='Things data protection / privacy (some AI), Sept/Oct 2024'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-6513072524154300003</id><published>2024-10-06T15:42:00.003+01:00</published><updated>2024-10-06T15:42:31.809+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CJEU"/><category scheme="http://www.blogger.com/atom/ns#" term="compensation"/><category scheme="http://www.blogger.com/atom/ns#" term="data protection"/><category scheme="http://www.blogger.com/atom/ns#" term="GDPR"/><category scheme="http://www.blogger.com/atom/ns#" term="liability"/><title type='text'>GDPR compensation: strict liability? employee training / awareness</title><content type='html'>&lt;p&gt;&lt;a href=&quot;https://curia.europa.eu/juris/document/document.jsf?text=&amp;amp;docid=284641&amp;amp;pageIndex=0&amp;amp;doclang=EN&quot;&gt;Case C‑741/21, GP v juris GmbH&lt;/a&gt;&amp;nbsp;is not a recent judgment, but it still bugs me. Yes, it clarifies that mere infringement of GDPR provisions giving data subjects rights&amp;nbsp;&lt;i&gt;doesn&#39;t&lt;/i&gt;&amp;nbsp;in itself necessarily constitute non-material damage, and that factors for determining fines, including when the same processing infringes multiple provisions,&amp;nbsp;&lt;i&gt;don&#39;t&lt;/i&gt;&amp;nbsp;apply when determining damages for&amp;nbsp;&lt;a href=&quot;https://www.gdprinfo.info/#a82&quot;&gt;Art.82&lt;/a&gt;&amp;nbsp;compensation purposes.&lt;/p&gt;&lt;p&gt;However, what concerns me is this: the court also said, &quot;it is&amp;nbsp;&lt;i&gt;not&lt;/i&gt;&amp;nbsp;sufficient for the controller, in order to be exempted from liability under paragraph 3 of that article [Art.82], to claim that the damage in question was&amp;nbsp;&lt;i&gt;caused by the failure of a person acting under his or her authority&lt;/i&gt;, within the meaning of Article 29 of that regulation.&quot; And:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;&quot;...it cannot be sufficient for him or her to demonstrate that he or she &lt;i&gt;had given instructions&lt;/i&gt; to persons acting under its authority, within the meaning of Article 29 of that regulation, and that one of those persons failed in his or her obligation to follow those instructions, with the result that that person contributed to the occurrence of the damage in question.&lt;/p&gt;&lt;p&gt;53&amp;nbsp; &amp;nbsp; &amp;nbsp; If it were accepted that the controller may be exempted from liability merely by relying on the failure of a person acting under his or her authority, that would undermine the effectiveness of the right to compensation enshrined in Article 82(1) of the GDPR, as the referring court noted, in essence, and would not be consistent with the objective of that regulation, which is to ensure a high level of protection for individuals with regard to the processing of their personal data.&quot;&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Where should the line be drawn, then? It seems that, at least in the UK, a controller is&amp;nbsp;&lt;i&gt;not&lt;/i&gt;&amp;nbsp;responsible for the acts of a rogue employee, who clearly becomes a controller&amp;nbsp;&lt;i&gt;in their own right&lt;/i&gt;. But if, &lt;i&gt;despite&lt;/i&gt; an employer giving clear instructions to its employees, providing them with training, and implementing awareness-raising measures, a &lt;i&gt;careless, mistaken or ignorant employee&lt;/i&gt; does something they shouldn&#39;t have (or doesn&#39;t do something they should have), and that results in the employer infringing GDPR, the employer is now&amp;nbsp;&lt;i&gt;still&lt;/i&gt; liable to compensate affected data subjects for the damage, including non-material damage, that they suffer arising from the infringement.&lt;/p&gt;&lt;p&gt;It had generally been thought that proving the organisation conducted training and awareness-raising measures would help it, at least perhaps in relation to potential&amp;nbsp;&lt;i&gt;fines&lt;/i&gt; for security breaches or the amount of fines, and some national regulators have taken post-breach training/awareness-raising measures into account there. Indeed, regulators &lt;a href=&quot;https://www.edpb.europa.eu/system/files/2023-10/EDPB_guidelines_202007_controllerprocessor_final_en.pdf&quot;&gt;generally consider&lt;/a&gt; that employee training/awareness measures are &lt;i&gt;essential&lt;/i&gt; to comply with Art.32. However, it looks like such measures will &lt;i&gt;not&lt;/i&gt; help employers to reduce or avoid &lt;i&gt;compensation &lt;/i&gt;claims, at least under the EU GDPR.&lt;/p&gt;&lt;p&gt;Hopefully, given that regulators expect employee training/awareness-raising, this case won&#39;t result in organisations deciding to &lt;i&gt;stop &lt;/i&gt;providing clear instructions/policies and training and awareness-raising measures for their employees, whether on security or other GDPR requirements. But, it doesn&#39;t exactly incentivise such measures... though it will certainly incentivise data subjects to claim compensation, including perhaps collective action lawsuits directly or through representatives, in cases where infringements were caused by the controller&#39;s employee(s) not following instructions or their training.&amp;nbsp; Proving that a controller &quot;is &lt;i&gt;not in any way responsible&lt;/i&gt; for the event giving rise to the damage&quot; under &lt;a href=&quot;https://www.gdprinfo.info/#a82.3&quot;&gt;Art.82(3)&lt;/a&gt; is a tough ask, but Art.82(3) says what it says. Effectively, this seems to create strict liability for compensation, unless the controller can disprove causation. Talk about rock and a hard place...&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/6513072524154300003'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/6513072524154300003'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2024/10/gdpr-compensation-strict-liability.html' title='GDPR compensation: strict liability? employee training / awareness'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-2668271852017230668</id><published>2024-10-01T08:21:00.010+01:00</published><updated>2024-10-19T20:11:14.716+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Canada"/><category scheme="http://www.blogger.com/atom/ns#" term="cloud"/><category scheme="http://www.blogger.com/atom/ns#" term="CRA"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber"/><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="DORA"/><category scheme="http://www.blogger.com/atom/ns#" term="eu"/><category scheme="http://www.blogger.com/atom/ns#" term="legislation"/><category scheme="http://www.blogger.com/atom/ns#" term="NIS Regulations"/><category scheme="http://www.blogger.com/atom/ns#" term="NIS2 Directive"/><category scheme="http://www.blogger.com/atom/ns#" term="passwords"/><category scheme="http://www.blogger.com/atom/ns#" term="product liability"/><category scheme="http://www.blogger.com/atom/ns#" term="ransomware"/><category scheme="http://www.blogger.com/atom/ns#" term="SBOM"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="software"/><category scheme="http://www.blogger.com/atom/ns#" term="uk"/><category scheme="http://www.blogger.com/atom/ns#" term="USA"/><title type='text'>Things cyber security, summer / Sept 2024</title><content type='html'>&lt;p&gt;&lt;b&gt;Software acquisition&lt;/b&gt;: procurement teams acquiring third-party software may find useful &lt;a href=&quot;https://www.cisa.gov/resources-tools/resources/secure-demand-guide&quot;&gt;NIST&#39;s list of questions&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://www.cisa.gov/sites/default/files/2024-08/SecureByDemandGuide_080624_508c.pdf&quot;&gt;PDF&lt;/a&gt;) to ask and security considerations relevant before, during and after procurement; e.g. some of those questions could be included in &lt;b&gt;contractual warranties&lt;/b&gt;&amp;nbsp;and/or &lt;b&gt;due diligence questionnaires&lt;/b&gt;. See also CISA&#39;s related &lt;a href=&quot;https://www.cisa.gov/resources-tools/resources/software-acquisition-guide-government-enterprise-consumers-software-assurance-cyber-supply-chain&quot;&gt;Software Acquisition Guide for Government Enterprise Consumers: Software Assurance in the Cyber-Supply Chain Risk Management (C-SCRM) Lifecycle&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://www.cisa.gov/sites/default/files/2024-07/PDM24050%20Software%20Acquisition%20Guide%20for%20Government%20Enterprise%20ConsumersV2_508c.pdf&quot;&gt;PDF&lt;/a&gt;, spreadsheet), again useful for private sector organisations too.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Personal data breaches/PDBs&lt;/b&gt;: an SA is &lt;i&gt;not &lt;/i&gt;required to fine/enforce for a PDB if that&#39;s &quot;not appropriate, necessary or proportionate to remedy the shortcoming found and to ensure that that regulation is fully enforced&quot; (&lt;a href=&quot;https://curia.europa.eu/juris/document/document.jsf?text=&amp;amp;docid=290402&amp;amp;pageIndex=0&amp;amp;doclang=EN&quot;&gt;Case C‑768/21, TR v Land Hessen&lt;/a&gt;).&lt;/p&gt;&lt;p&gt;&lt;b&gt;Revised EU Product Liability Directive&lt;/b&gt;: the new EU Parliament has approved the &lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-13435-2024-INIT/en/pdf&quot;&gt;text&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CONSIL%3APE_7_2024_INIT&quot;&gt;Eur-Lex&lt;/a&gt;), so it&amp;nbsp;&lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-13435-2024-INIT/en/pdf&quot;&gt;just&lt;/a&gt;&amp;nbsp;&lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-13760-2024-INIT/en/pdf&quot;&gt;remains&lt;/a&gt;&amp;nbsp;for the Council to adopt it (although&amp;nbsp;&lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-13760-2024-ADD-1/en/pdf&quot;&gt;Estonia is against&lt;/a&gt;&amp;nbsp;the procedural rules); when published in the OJ thereafter, it will become law. Significance? For the purposes of no-fault liability for defective products, &quot;product&quot; will explicitly include &lt;b&gt;software including &lt;/b&gt;that supplied via &lt;b&gt;SaaS&lt;/b&gt;. Note the emphasis on &lt;b&gt;safety&lt;/b&gt; and &lt;b&gt;cyber vulnerabilities&lt;/b&gt;.&amp;nbsp;&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;p&gt;Art.7(2): &quot;In assessing the defectiveness of a product, all circumstances shall be taken into account, including... (f) relevant product safety requirements, including safety-relevant &lt;b&gt;cybersecurity requirements&lt;/b&gt;...&quot;&lt;/p&gt;&lt;p&gt;Also see the Recitals:&quot;A product can also be found to be defective on account of its &lt;b&gt;cybersecurity vulnerability&lt;/b&gt;, for example where the product does not fulfil safety-relevant cybersecurity requirements... relevant product safety requirements, including &lt;b&gt;safety-relevant cybersecurity requirements&lt;/b&gt;, and interventions by competent authorities, such as issuing product recalls, or by economic operators themselves, should be taken into account in the assessment of defectiveness. Such interventions should, however, not in themselves create a presumption of defectiveness...The possibility for economic operators to avoid liability by proving that the defectiveness came into being after they placed the product on the market or put it into service should be restricted when a product’s defectiveness consists in the &lt;b&gt;lack of software updates or upgrades necessary to address cybersecurity vulnerabilities and maintain the safety&lt;/b&gt; of the product... manufacturers should also not be exempted from liability for damage caused by their defective products when the defectiveness results from their failure to supply the software security updates or upgrades that are necessary to address those products’ vulnerabilities in response to evolving cybersecurity risks &lt;i&gt;[unless not in their control e.g. owner fails to install it; yet, &lt;b&gt;no obligation&lt;/b&gt;&amp;nbsp;under &lt;b&gt;this&lt;/b&gt;&amp;nbsp;law to provide updates/upgrades but see CRA below]...&lt;/i&gt;&amp;nbsp;a third party exploiting a cybersecurity vulnerability of a product. In the interests of consumer protection, where a product is defective, for example due to a vulnerability that makes the product less safe than the public at large is entitled to expect, the liability of the economic operator should not be reduced or disallowed as a result of such acts or omissions by a third party. However, it should be possible to reduce or disallow the economic operator’s liability where injured persons&amp;nbsp; themselves have negligently contributed to the cause of the damage, for example where the injured person negligently failed to install updates or upgrades provided by the economic operator that would have mitigated or avoided the damage.&quot;&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;b&gt;EU Cyber Resilience Act (CRA)&lt;/b&gt; on &quot;horizontal cybersecurity requirements for products with digital elements&quot;: the new EU Parliament has approved the&amp;nbsp;&lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-13431-2024-INIT/en/pdf&quot;&gt;text&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CONSIL%3APE_100_2023_INIT&quot;&gt;Eur-Lex&lt;/a&gt;), so it&amp;nbsp;&lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-13757-2024-INIT/en/pdf&quot;&gt;just&lt;/a&gt;&amp;nbsp;remains&amp;nbsp;for the Council to adopt it; when published in the OJ thereafter, it will become law. Note, this aims to &quot;set the boundary conditions for the development of secure products with digital elements by ensuring that &lt;b&gt;hardware and software &lt;/b&gt;products are placed on the market with fewer &lt;b&gt;vulnerabilities&lt;/b&gt; and that manufacturers take security seriously throughout a product’s lifecycle&quot;.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://eur-lex.europa.eu/eli/reg/2022/2554/oj&quot;&gt;&lt;b&gt;EU DORA Regulation&lt;/b&gt;&lt;/a&gt;, financial entities: there are&amp;nbsp;&lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-12741-2024-INIT/en/pdf&quot;&gt;corrections&lt;/a&gt;&amp;nbsp;in the versions for FR, RO, SL [sic, SI?]&lt;/p&gt;&lt;p&gt;&lt;b&gt;UK Cyber Security and Resilience Bill&lt;/b&gt;: while the UK recently&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/government/news/data-centres-to-be-given-massive-boost-and-protections-from-cyber-criminals-and-it-blackouts&quot;&gt;designated&lt;/a&gt; &lt;b&gt;data centres&lt;/b&gt;&amp;nbsp;as Critical National Infrastructure (CNI), the &lt;a href=&quot;https://www.npsa.gov.uk/critical-national-infrastructure-0&quot;&gt;CPNI list&lt;/a&gt; doesn&#39;t seem to have been updated accordingly yet. Note, this is &lt;u&gt;not&lt;/u&gt; the same as extending the UK NIS Regulations to cover data centres (as the EU &lt;a href=&quot;https://eur-lex.europa.eu/eli/dir/2022/2555&quot;&gt;NIS2 Directive&lt;/a&gt; will do, though it&#39;s inapplicable in the UK post-Brexit). However, DSIT has indicated in its &lt;a href=&quot;https://mailchi.mp/dcms/cyber-security-newsletter-september-2024&quot;&gt;Sept newsletter&lt;/a&gt; (updated: &lt;a href=&quot;https://www.gov.uk/government/publications/dsit-cyber-security-newsletter-september-2024/dsit-cyber-security-newsletter-september-2024&quot;&gt;now on gov.uk&lt;/a&gt;) that the Bill will strengthen UK’s cyber resilience and ensure the critical infrastructure and essential services are more secure, by &quot;strengthening the UK’s only cross-sector cyber legislation – the &lt;b&gt;Network and Information Systems (NIS) Regulations 2018&lt;/b&gt;. Measures will include expanding the remit of the regulation to protect more digital services and supply chains&quot;. And just out: a &lt;a href=&quot;https://www.gov.uk/government/collections/cyber-security-and-resilience-bill&quot;&gt;DSIT webpage on this Bill&lt;/a&gt;.&amp;nbsp;Currently&amp;nbsp;it says little more about the Bill that what was in the &lt;a href=&quot;https://assets.publishing.service.gov.uk/media/6697f5c10808eaf43b50d18e/The_King_s_Speech_2024_background_briefing_notes.pdf&quot;&gt;King&#39;s Speech background PDF&lt;/a&gt;, but it does indicate that this Bill will be introduced to Parliament in &lt;b&gt;2025&lt;/b&gt;. (On ransomware under the Bill, please see below.)&lt;/p&gt;&lt;p&gt;&lt;b&gt;Ransomware&lt;/b&gt;: in late 2023, Interpol and&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/government/publications/cri-joint-statement-on-ransomware-payments/cri-joint-statement-on-ransomware-payments#fn:1&quot;&gt;50 countries&lt;/a&gt;&amp;nbsp;including the UK signed a Counter Ransomware Initiative (CRI) &lt;a href=&quot;https://www.gov.uk/government/publications/cri-joint-statement-on-ransomware-payments/cri-joint-statement-on-ransomware-payments&quot;&gt;joint statement on ransomware payments&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://www.whitehouse.gov/briefing-room/statements-releases/2023/11/01/international-counter-ransomware-initiative-2023-joint-statement/&quot;&gt;US press release&lt;/a&gt;). The European Commission has now been &lt;a href=&quot;https://data.consilium.europa.eu/doc/document/CM-4179-2024-INIT/en/pdf&quot;&gt;authorised&lt;/a&gt; to negotiate, on behalf of the EU, the International Counter Ransomware Initiative &lt;b&gt;2024&lt;/b&gt; Joint Statement (&lt;a href=&quot;https://intgovforum.org/sites/default/files/webform/igf_2024_open_forums_town_hall_s/252467/Open%20Forum%20Background%20Paper.pdf&quot;&gt;background on CRI&lt;/a&gt;). UPDATED: now see the full &lt;a href=&quot;https://www.gov.uk/government/publications/cri-guidance-for-organisations-during-ransomware-incidents/cri-guidance-for-organisations-during-ransomware-incidents&quot;&gt;CRI guidance for organisations during ransomware incidents&lt;/a&gt; (&lt;a href=&quot;https://www.gov.uk/government/news/uk-and-singapore-lead-international-action-to-support-ransomware-victims&quot;&gt;news release&lt;/a&gt;).&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;(In May 2024, the UK NCSC with insurance industry bodies had &lt;a href=&quot;https://www.ncsc.gov.uk/guidance/organisations-considering-payment-in-ransomware-incidents&quot;&gt;issued&lt;/a&gt;&amp;nbsp;&lt;a href=&quot;https://www.ncsc.gov.uk/files/Guidance-for-organisations-considering-payment-in-ransomware-incidents.pdf&quot;&gt;Guidance for organisations considering payment in ransomware incidents&lt;/a&gt;, and the King&#39;s Speech&amp;nbsp;&lt;a href=&quot;https://assets.publishing.service.gov.uk/media/6697f5c10808eaf43b50d18e/The_King_s_Speech_2024_background_briefing_notes.pdf&quot;&gt;detailed PDF&lt;/a&gt;&amp;nbsp;in July 2024 stated that the forthcoming &lt;b&gt;Cyber Security and Resilience Bill&lt;/b&gt; will be, among other things, &quot;mandating &lt;b&gt;increased incident reporting&lt;/b&gt; to give government better data on cyber attacks, including where a company has been held to ransom&quot;.)&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;b&gt;UK communications providers &amp;amp; security&lt;/b&gt;: Ofcom&amp;nbsp;&lt;a href=&quot;https://www.ofcom.org.uk/internet-based-services/network-security/resilience-guidance&quot;&gt;updated&lt;/a&gt;&amp;nbsp;its&amp;nbsp;&lt;a href=&quot;https://www.ofcom.org.uk/siteassets/resources/documents/consultations/category-1-10-weeks/272921-resilience-guidance-and-mobile-ran-power-back-up/associated-documents/network-and-service-resilience-guidance-for-communication-providers.pdf?v=375122&quot;&gt;Network and Service Resilience Guidance for Communications Providers&lt;/a&gt;&amp;nbsp;for telcos in early Sept 2024, following consultation.&amp;nbsp; Ofcom&amp;nbsp;&lt;a href=&quot;https://ofcom.cmail20.com/t/i-e-fevid-tktdtyuuz-jy/&quot;&gt;said&lt;/a&gt;, &quot;Specifically, we are making clear that we expect them to: ensure networks are designed to avoid or reduce single points of failure; make sure key infrastructure points have automatic failover functionality built in, so traffic is immediately diverted to another device or site when equipment fails; and&amp;nbsp; set out the processes, tools and training that should be considered to support the requirements on resilience&quot;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Proposed EU CSAM Regulation&lt;/b&gt;: the Global Encryption Coalition &lt;a href=&quot;https://www.globalencryption.org/2024/09/gec-steering-committee-statement-on-9-september-text-of-the-european-csa-regulation/&quot;&gt;is concerned&lt;/a&gt; about the Hungarian Presidency&#39;s &lt;a href=&quot;https://www.patrick-breyer.de/wp-content/uploads/2024/09/st12406.en_clean.pdf&quot;&gt;9 Sept 2024 compromise text&lt;/a&gt;, which would still require scanning of &lt;b&gt;encrypted messaging services&lt;/b&gt;, undermining encryption and accordingly security and privacy. The Presidency is &lt;a href=&quot;https://www.patrick-breyer.de/wp-content/uploads/2024/09/CSAM-policy-debate-September-2024-via-politico.pdf&quot;&gt;pushing for&lt;/a&gt; a partial general approach at the Council by as soon as 10 Oct 2024! (Good &lt;a href=&quot;https://www.accessnow.org/encryption-faq/&quot;&gt;encryption FAQ&lt;/a&gt;).&lt;/p&gt;&lt;p&gt;&lt;b&gt;Passwords&lt;/b&gt;: NIST&#39;s latest draft&amp;nbsp;&lt;a href=&quot;https://csrc.nist.gov/pubs/sp/800/63/b/4/2pd&quot;&gt;Digital Identity Guidelines: Authentication and Authenticator Management&lt;/a&gt;&amp;nbsp;now states, among other things, that passwords:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Minimum - &quot;shall&quot; be required to be &lt;b&gt;8 characters minimum&lt;/b&gt;, and &quot;should&quot; be required to be &lt;b&gt;15 characters&lt;/b&gt; minimum&lt;/li&gt;&lt;li&gt;Maximum - &quot;should&quot; accept 64 characters (to enable passphrases)&lt;/li&gt;&lt;li&gt;Types of characters - &quot;should&quot; accept ASCII, space, Unicode; but &quot;shall&quot; &lt;b&gt;NOT &lt;/b&gt;require other composition rules like a mix of different character types - unlike what most organisations currently require!&lt;/li&gt;&lt;li&gt;Change - &quot;shall &lt;b&gt;not&lt;/b&gt;&quot; be required to be changed by users periodically (again unlike what too many organisations do), but change &quot;shall&quot; be required if there&#39;s evidence the &quot;authenticator&quot; was compromised (cf. that the password itself was compromised)&lt;/li&gt;&lt;li&gt;No storage of password hints accessible to unauthenticated people (e.g. not logged in), and &lt;b&gt;no &lt;/b&gt;prompts for knowledge-based authentication (like first pet&#39;s name) or security questions when choosing passwords&lt;/li&gt;&lt;/ul&gt;(Added: security guru Bruce Schneier &lt;a href=&quot;https://www.schneier.com/blog/archives/2024/09/nist-recommends-some-common-sense-password-rules.html&quot;&gt;approves&lt;/a&gt; of these changes!)&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Payment webpages&lt;/b&gt;: fines &lt;a href=&quot;https://ico.org.uk/media/action-weve-taken/mpns/2618421/ba-penalty-20201016.pdf&quot;&gt;have&lt;/a&gt; &lt;a href=&quot;https://ico.org.uk/media/action-weve-taken/2618609/ticketmaster-uk-limited-mpn.pdf&quot;&gt;been&lt;/a&gt; imposed on companies under GDPR because their payment webpages got hacked, directly or indirectly, enabling criminals to capture customers&#39; payment card details for fraud. The recent &lt;a href=&quot;https://scotthelme.co.uk/introducing-frame-watch-monitor-payment-page-activity-with-ease/&quot;&gt;Frame Watch&lt;/a&gt; feature of ReportURI, helmed by noted security expert Scott Helme (if you&#39;ll forgive the pun!) alongside its existing Script Watch and Data Watch features, looks helpful to monitor and provide alerts for suspicious activity on payment pages.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Cloud forensics&lt;/b&gt;: post-data breach forensics on cloud services isn&#39;t easy. &lt;a href=&quot;https://csrc.nist.gov/pubs/sp/800/201/final&quot;&gt;NIST&#39;s&amp;nbsp;Cloud Computing Forensic Reference Architecture&lt;/a&gt; document, from July 2024, suggests ways to implement cloud architecture to faciliate forensics.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Aligning US federal agencies&#39; cyber defence&lt;/b&gt;: CISA&#39;s priority areas aren&#39;t surprising: asset management, vulnerability management, defensible architecture, cyber supply chain risk management, and incident detection and response. The tricky bit &lt;a href=&quot;https://www.cisa.gov/news-events/alerts/2024/09/16/new-cisa-plan-aligns-federal-agencies-cyber-defense&quot;&gt;is&lt;/a&gt;, of course, aligning systems/processes accordingly, e.g. by increasing operational visibility of assets, managing the attack surface of Internet-accessible assets, securing cloud applications etc., under its&amp;nbsp;&lt;a href=&quot;https://www.cisa.gov/sites/default/files/2024-09/FY2024%20FOCALPlanPublicVersion%20TLP%20Clear%20508.pdf&quot;&gt;Federal Civilian Executive Branch (FCEB) Operational Cybersecurity Alignment (FOCAL) Plan&lt;/a&gt;. Again, much of this is of use to the private sector too.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Also of interest&lt;/b&gt;:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/government/news/ministry-of-defence-analyses-future-global-strategic-trends&quot;&gt;recently-published&lt;/a&gt;&amp;nbsp;UK MoD&#39;s&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/government/publications/global-strategic-trends-out-to-2055&quot;&gt;annual analysis of future global strategic trends 2024&lt;/a&gt;&amp;nbsp;mentions cyber and AI, unsurprisingly&amp;nbsp;&lt;/li&gt;&lt;li&gt;NIST on&amp;nbsp;&lt;a href=&quot;https://csrc.nist.gov/pubs/sp/800/50/r1/final&quot;&gt;Building a Cybersecurity and Privacy Learning Program&lt;/a&gt;&lt;/li&gt;&lt;li&gt;US &lt;a href=&quot;https://www.federalregister.gov/documents/2024/09/26/2024-21903/securing-the-information-and-communications-technology-and-services-supply-chain-connected-vehicles&quot;&gt;proposed rule&lt;/a&gt; intended &quot;&lt;a href=&quot;https://www.bis.gov/press-release/commerce-announces-proposed-rule-secure-connected-vehicle-supply-chains-foreign&quot;&gt;to Secure Connected Vehicle Supply Chains from Foreign Adversary Threats&lt;/a&gt;&quot;&lt;/li&gt;&lt;li&gt;US White House report, &lt;a href=&quot;https://www.whitehouse.gov/wp-content/uploads/2024/09/Roadmap-to-Enhancing-Internet-Routing-Security.pdf&quot;&gt;Roadmap to Enhancing Internet Routing Security&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Many countries&#39; agencies&#39;&amp;nbsp;&lt;a href=&quot;https://www.cyber.gov.au/sites/default/files/2024-09/PROTECT-Detecting-and-Mitigating-Active-Directory-Compromises.pdf&quot;&gt;Guidance on Detecting and Mitigating Active Directory Compromises&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://www.cisa.gov/news-events/alerts/2024/09/26/asds-acsc-cisa-and-us-and-international-partners-release-guidance-detecting-and-mitigating-active&quot;&gt;news release&lt;/a&gt;)&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.gov.uk/government/news/uk-convenes-global-coalition-to-boost-cyber-skills-and-tackle-growing-threats&quot;&gt;Initiatives&lt;/a&gt;&amp;nbsp;on closing the &lt;a href=&quot;https://www.enisa.europa.eu/news/european-cybersecurity-skills-conference-intensifying-our-efforts-to-close-the-cybersecurity-skills-gap-in-the-eu&quot;&gt;cyber skills gap&lt;/a&gt;&amp;nbsp;(what about encouraging career changers, part-timers, retired people etc., not just incentivising teens/younger people into cyber careers?)&lt;/li&gt;&lt;li&gt;UK NCSC on &lt;a href=&quot;https://www.ncsc.gov.uk/blog-post/sboms-and-the-importance-of-inventory&quot;&gt;software bills of materials (SBOM)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Dissection &lt;a href=&quot;https://www.ofcom.org.uk/phones-and-broadband/telecoms-infrastructure/bt-999-outage-june-23/?utm_medium=email&amp;amp;utm_campaign=Weekly%20publications%20update%2027%20September%202024&amp;amp;utm_content=Weekly%20publications%20update%2027%20September%202024+CID_5dcb496185cd090f1f9cecea50722a97&amp;amp;utm_source=updates&amp;amp;utm_term=Investigation%20into%20BT%20following%20999%20emergency%20call%20service%20outage%20on%2025%20June%202023&quot;&gt;of&lt;/a&gt; exactly &lt;a href=&quot;https://www.ofcom.org.uk/siteassets/resources/documents/about-ofcom/bulletins/enforcement-bulletin/all-cases/cw_01274/non-confidential-decision-investigation-into-bt-following-999-emergency-call-service-outage-on-25-june-2023.pdf?v=380903&quot;&gt;what went wrong&lt;/a&gt; leading to the 2023 UK emergency services outage - this sort of detailed&amp;nbsp;sequencing of events, root causes etc. is always helpful for others to learn from&lt;/li&gt;&lt;li&gt;Microsoft&#39;s Secure Future Initiative (for secure by design, secure by default, secure operations) -&amp;nbsp;&lt;a href=&quot;https://www.microsoft.com/en-us/security/blog/2024/09/23/securing-our-future-september-2024-progress-update-on-microsofts-secure-future-initiative-sfi/&quot;&gt;progress update&lt;/a&gt; and&amp;nbsp;&lt;a href=&quot;https://www.microsoft.com/en-us/trust-center/security/secure-future-initiative&quot;&gt;Sept 2024 report&lt;/a&gt;, initiated after attacks like the well-known successful attacks on Exchange for email. The SFI&#39;s 6 key pillars represent security 101&amp;nbsp;for all: protect identities and secrets, protect tenants and isolate production systems, protect networks, protect engineering systems, monitor and detect threats, accelerate response and remediation&lt;/li&gt;&lt;li&gt;ADDED Cloud is now quite mainstream, but the&amp;nbsp;&lt;b&gt;cloud adoption checklist&lt;/b&gt;&amp;nbsp;in US CISA&#39;s&amp;nbsp;&lt;a href=&quot;https://www.cisa.gov/sites/default/files/2024-07/24_0726_safecom_public_safety_cloud_adoption_considerations_24_0726_final_508C.pdf&quot;&gt;Considerations for Public Safety Cloud Computing Adoption&lt;/a&gt;&amp;nbsp;from Jul 24 is generally useful for&amp;nbsp;&lt;b&gt;all organisations&lt;/b&gt;, even those&amp;nbsp;&lt;i&gt;not&lt;/i&gt;&amp;nbsp;in public safety, and covers much more than just security issues&amp;nbsp;&lt;/li&gt;&lt;li&gt;ADDED Hybrid cloud risks: Microsoft has &lt;a href=&quot;https://www.microsoft.com/en-us/security/blog/2024/09/26/storm-0501-&quot;&gt;noted&lt;/a&gt; threat actor Storm-0501 compromising on-prem environments then moving laterally &quot;&lt;i&gt;from on-premises &lt;b&gt;to cloud environment&lt;/b&gt;&lt;/i&gt;, leading to data exfiltration, credential theft, tampering, persistent backdoor access, and ransomware deployment&quot;, targeting many US public and private sector organisations&lt;/li&gt;&lt;li&gt;ADDED&amp;nbsp;&lt;a href=&quot;https://www.enisa.europa.eu/publications/enisa-threat-landscape-&quot;&gt;ENISA Threat Landscape 2024&lt;/a&gt;&amp;nbsp;identifies 7 prime cybersecurity threats, topped by threats against &lt;b&gt;availability&lt;/b&gt;, then &lt;b&gt;ransomware&lt;/b&gt; and threats against &lt;b&gt;data&lt;/b&gt;, and analyses many publicly-reported incidents&lt;/li&gt;&lt;li&gt;ADDED Canada: if attacker accesses and encrypts data&amp;nbsp;&lt;i&gt;without&lt;/i&gt; exfiltration e.g. for &lt;b&gt;ransom&lt;/b&gt; purposes, that is &lt;a href=&quot;https://www.dentonsdata.com/ipc-trilogy-considering-encryption-based-non-extractive-cyber-attacks/?utm_medium=email&amp;amp;utm_medium=email&amp;amp;utm_campaign=Daily%20Dentons%20Data&amp;amp;utm_content=Daily%20Dentons%20Data+CID_cb8d13cd283c0c989b7b61fef0cc7ba9&amp;amp;utm_source=Campaign%20Monitor&amp;amp;utm_term=IPC%20Trilogy%20Considering%20Encryption-Based%20Non-Extractive%20Cyber%20Attacks&quot;&gt;still considered a breach that must be notified&lt;/a&gt; to affected individuals under Ontario’s Personal Health Information Protection Act (PHIPA), and the Child, Youth and Family Services Act (CYFSA).&lt;/li&gt;&lt;li&gt;ADDED &lt;a href=&quot;https://eur-lex.europa.eu/eli/dir/2022/2555&quot;&gt;NIS2 Directive&lt;/a&gt;, very little time left before it&#39;s fully applicable! - draft national law implementations include:&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://www.gov.ie/en/publication/229af-general-scheme-of-the-national-cyber-security-bill-2024/&quot;&gt;Ireland&#39;s National Cyber Security Bill 2024&lt;/a&gt;&amp;nbsp;(from 30 Aug 24)&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.gazzettaufficiale.it/eli/id/2024/10/01/24G00155/SG&quot;&gt;Italy&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/2668271852017230668'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/2668271852017230668'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2024/10/things-cyber-security-summer-sept-2024.html' title='Things cyber security, summer / Sept 2024'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-1351522865372242230</id><published>2024-09-29T21:18:00.008+01:00</published><updated>2024-10-06T16:25:39.261+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AI"/><category scheme="http://www.blogger.com/atom/ns#" term="AI Act"/><category scheme="http://www.blogger.com/atom/ns#" term="AI Liability Directive"/><category scheme="http://www.blogger.com/atom/ns#" term="AI risk assessment"/><category scheme="http://www.blogger.com/atom/ns#" term="AI uses"/><category scheme="http://www.blogger.com/atom/ns#" term="artificial intelligence"/><category scheme="http://www.blogger.com/atom/ns#" term="chatbots"/><category scheme="http://www.blogger.com/atom/ns#" term="CRA"/><category scheme="http://www.blogger.com/atom/ns#" term="D&amp;TA"/><category scheme="http://www.blogger.com/atom/ns#" term="data provenance"/><category scheme="http://www.blogger.com/atom/ns#" term="equality"/><category scheme="http://www.blogger.com/atom/ns#" term="FTC"/><category scheme="http://www.blogger.com/atom/ns#" term="hallucinations"/><category scheme="http://www.blogger.com/atom/ns#" term="hype"/><category scheme="http://www.blogger.com/atom/ns#" term="open-source"/><category scheme="http://www.blogger.com/atom/ns#" term="product liability"/><category scheme="http://www.blogger.com/atom/ns#" term="UN Digital Compact"/><title type='text'>Things AI, Sept 2024</title><content type='html'>&lt;p&gt;&lt;b&gt;Open-source AI models&lt;/b&gt;: from ICO&#39;s&amp;nbsp;&lt;a href=&quot;https://ico.org.uk/for-organisations/advice-and-services/innovation-advice/previously-asked-questions/&quot;&gt;previously-asked questions&lt;/a&gt;, this Q&amp;amp;A was added recently even though currently the &quot;Last updated&quot; date indicates 11 April 2024.&lt;br /&gt;Q: We want to develop a speech transcription service for use in our organisation, using an &lt;b&gt;open-source artificial intelligence (AI) model&lt;/b&gt;. Can we do this even though we &lt;i&gt;don’t&lt;/i&gt; have detailed information about how the model was trained? (see&amp;nbsp;&lt;a href=&quot;https://ico.org.uk/for-organisations/advice-and-services/innovation-advice/previously-asked-questions/#AI:~:text=Answer%3A%C2%A0Data%20protection%20law%20does%20not%20prevent&quot;&gt;the answer&lt;/a&gt;!)&lt;/p&gt;&lt;p&gt;&lt;b&gt;AI Act&lt;/b&gt;: from &lt;b&gt;Deloitte&#39;s &lt;/b&gt;&lt;a href=&quot;https://www2.deloitte.com/content/dam/Deloitte/dl/Documents/legal/Deloitte%20AI%20Act%20Survey_english.pdf&quot; style=&quot;font-weight: bold;&quot;&gt;AI Act Survey 2024&lt;/a&gt;,&amp;nbsp;not many companies surveyed have started prep, nearly half feel partially/poorly prepared, over half think the Act constrains their innovation capabilities in AI, there were mixed views on legal certainty and on the Act&#39;s impact on trust in AI, and almost half thought the Act&#39;s more of a hindrance to AI-based applications! But, over a 100 companies &lt;a href=&quot;https://ec.europa.eu/commission/presscorner/detail/en/IP_24_4864&quot;&gt;have signed&lt;/a&gt; the Commission&#39;s voluntary&amp;nbsp;&lt;a href=&quot;https://ec.europa.eu/newsroom/dae/redirection/document/107430&quot;&gt;AI Pledge&lt;/a&gt; under its &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/policies/ai-pact&quot;&gt;AI Pact&lt;/a&gt;, that seeks to encourage organisations to implement AI Act measures ahead of its formal applicable dates.&lt;/p&gt;&lt;p&gt;Beyond the AI Act, see more generally:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;the European Commission&#39;s &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/news/commission-publishes-policy-brief-competition-generative-ai-and-virtual-worlds&quot;&gt;policy brief on Competition in Generative AI and Virtual Worlds&lt;/a&gt;, and&amp;nbsp;&lt;/li&gt;&lt;li&gt;Europol&#39;s &lt;a href=&quot;https://www.europol.europa.eu/publication-events/main-reports/ai-and-policing&quot;&gt;report on AI and policing&lt;/a&gt;&amp;nbsp;and its benefits and challenges for law enforcement (&lt;a href=&quot;https://www.europol.europa.eu/media-press/newsroom/news/how-ai-can-strengthen-law-enforcement-insights-europols-new-report&quot;&gt;summary&lt;/a&gt;).&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Revised EU Product Liability Directive&lt;/b&gt;: the new EU Parliament has approved the&amp;nbsp;&lt;a href=&quot;https://data.consilium.europa.eu/doc/document/PE-7-2024-INIT/en/pdf&quot;&gt;text&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CONSIL%3APE_7_2024_INIT&quot;&gt;Eur-Lex&lt;/a&gt;), so it&amp;nbsp;&lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-13435-2024-INIT/en/pdf&quot;&gt;just&lt;/a&gt;&amp;nbsp;&lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-13760-2024-INIT/en/pdf&quot;&gt;remains&lt;/a&gt;&amp;nbsp;for the Council to adopt it (although&amp;nbsp;&lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-13760-2024-ADD-1/en/pdf&quot;&gt;Estonia is against&lt;/a&gt;&amp;nbsp;the procedural rules); when published in the OJ thereafter it will become law. Significance? For the purposes of no-fault liability for defective products, &quot;product&quot; will explicitly include&amp;nbsp;&lt;b&gt;software including&amp;nbsp;&lt;/b&gt;that supplied via&amp;nbsp;&lt;b&gt;SaaS&lt;/b&gt;.&amp;nbsp;The text also mentions software as&amp;nbsp;&lt;b&gt;including AI systems&lt;/b&gt;. Also:&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&quot;A &lt;b&gt;developer &lt;/b&gt;or &lt;b&gt;producer&lt;/b&gt; of software, &lt;b&gt;including AI system providers&lt;/b&gt; within [AI Act] should be treated as a manufacturer&quot;... &quot;Where a substantial modification is made through a software update or upgrade, or &lt;b&gt;due to the continuous learning of an AI system&lt;/b&gt;, the substantially modified product should be considered to be made available on the market or put into service at the time that modification is actually made.&quot;&lt;/p&gt;&lt;/blockquote&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&quot;National courts should &lt;b&gt;presume the defectiveness of a product or the causal link&lt;/b&gt; between the damage and the defectiveness, or both, where, notwithstanding the defendant’s disclosure of information, it would be &lt;b&gt;excessively difficult&lt;/b&gt; for the claimant, in particular due to the technical or scientific complexity of the case, to prove the defectiveness or the causal link, or both... Technical or scientific complexity should be determined by national courts on a case-by-case basis, taking into account various factors. Those factors should include...the complex nature of the causal link,&amp;nbsp; such as... a link that, in order to be proven, would require the claimant to explain the inner workings of an AI system...&amp;nbsp; ...in a claim concerning an AI system, the claimant should, for the court to decide that excessive difficulties exist, neither be required to explain the AI system’s specific characteristics nor how those characteristics make it harder to establish the causal link.&quot;&amp;nbsp;&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;b&gt;EU Cyber Resilience Act (CRA)&lt;/b&gt;&amp;nbsp;on &quot;horizontal cybersecurity requirements for products with digital elements&quot;: the new EU Parliament has approved the&amp;nbsp;&lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-13431-2024-INIT/en/pdf&quot;&gt;text&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CONSIL%3APE_100_2023_INIT&quot;&gt;Eur-Lex&lt;/a&gt;), so it&amp;nbsp;&lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-13757-2024-INIT/en/pdf&quot;&gt;just&lt;/a&gt;&amp;nbsp;remains&amp;nbsp;for the Council to adopt it; when published in the OJ thereafter, it will become law. Note, this aims to &quot;set the boundary conditions for the development of secure products with digital elements by ensuring that&amp;nbsp;&lt;b&gt;hardware and software&amp;nbsp;&lt;/b&gt;products are placed on the market with fewer&amp;nbsp;&lt;b&gt;vulnerabilities&lt;/b&gt;&amp;nbsp;and that manufacturers take security seriously throughout a product’s lifecycle&quot;. Also note, &quot;Products with digital elements classified as &lt;b&gt;high-risk AI systems&lt;/b&gt; pursuant to Article 6 of [AI Act] which fall within the scope of this Regulation should comply with the essential cybersecurity requirements set out in this Regulation...&quot; (see much more in Art.12 and Rec.51 which specifically cover &lt;b&gt;high-risk AI systems&lt;/b&gt;, and Art.52(14)).&amp;nbsp; BTW, the Commission is &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/news/call-applications-cyber-resilience-act-cra-expert-group?pk_source=ec_newsroom&amp;amp;pk_medium=email&amp;amp;pk_campaign=Shaping%20Europe%27s%20Digital%20Future%20website%20updates&quot;&gt;inviting cybersecurity experts&lt;/a&gt; to apply to join its CRA Expert Group. Various criticisms of the CRA have been mentioned in &lt;a href=&quot;https://bit.ly/hontechbook&quot;&gt;my book&lt;/a&gt;/&lt;a href=&quot;https://bit.ly/hontechbookpdf&quot;&gt;free companion PDF&lt;/a&gt;; here&#39;s &lt;a href=&quot;https://www.lawfaremedia.org/article/the-cyber-resilience-act--an-accidental-european-alien-torts-statute&quot;&gt;another critique&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;b&gt;EU AI Liability Directive&lt;/b&gt;: added -&amp;nbsp;Proposal for a directive on adapting non-contractual civil liability rules to artificial intelligence: Complementary impact assessment from the EPRS (as requested by a Europarl committee) &quot;&lt;a href=&quot;https://www.europarl.europa.eu/thinktank/en/document/EPRS_STU(2024)762861&quot;&gt;proposes&lt;/a&gt; that the AILD should extend its scope to include general-purpose and other &#39;high-impact AI systems&#39;, as well as software. It also discusses a mixed liability framework that balances fault-based and strict liability. Notably, the study recommends transitioning from an AI-focused directive to a software liability regulation, to prevent market fragmentation and enhance clarity across the EU&quot; (&lt;a href=&quot;https://www.europarl.europa.eu/RegData/etudes/STUD/2024/762861/EPRS_STU(2024)762861_EN.pdf&quot;&gt;PDF&lt;/a&gt;).&lt;/p&gt;&lt;p&gt;&lt;b&gt;UK:&lt;/b&gt;&amp;nbsp;the AI Act doesn&#39;t apply in the UK post-Brexit, so perhaps there are indeed more AI opportunities in the UK, on which&amp;nbsp;&lt;b&gt;Google&lt;/b&gt; has published a&amp;nbsp;&lt;a href=&quot;https://blog.google/around-the-globe/google-europe/united-kingdom/ai-potential-uk/&quot;&gt;blog&lt;/a&gt; and fuller &lt;a href=&quot;https://static.googleusercontent.com/media/publicpolicy.google/en//resources/uk_ai_opportunity_agenda_en.pdf&quot;&gt;paper&lt;/a&gt;. The UK&amp;nbsp;&lt;a href=&quot;https://labour.org.uk/updates/press-releases/peter-kyle-mp-secretary-of-state-for-science-innovation-and-technology-speech-at-labour-party-conference-2024/?_cldee=uXr8DIuSeqsgxxH1muN0tHTKcH3nkJq7Bi9ONew7aAU&amp;amp;recipientid=contact-7a73a3b01923e811811e5065f38a8ad1-63ac2f8c8fe64ef981ffd3e67e46b19b&amp;amp;esid=f311433c-b57c-ef11-ac20-000d3ade49af&quot;&gt;will make&lt;/a&gt;&amp;nbsp;the AI Safety Institute (AISI) a statutory body as well as &quot;identifying and realising the massive opportunities of AI&quot; including for government/public services. (Here, the UK&#39;s not alone: a &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/library/eu-study-calls-strategic-ai-adoption-transform-public-sector-services&quot;&gt;study&lt;/a&gt; for the European Commission emphasises AI&#39;s &quot;significant potential&quot; to improve EU public sector services.) AISI work includes assessing AI capabilities, e.g.&amp;nbsp;&lt;a href=&quot;https://www.aisi.gov.uk/work/early-insights-from-developing-question-answer-evaluations-for-frontier-ai&quot;&gt;Early Insights from Developing Question-Answer Evaluations for Frontier AI&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;But, the GDPR still applies in the UK: &lt;a href=&quot;https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/09/our-statement-on-changes-to-linkedin-ai-data-policy/&quot;&gt;ICO statement&lt;/a&gt; on LinkedIn&#39;s &lt;a href=&quot;https://www.linkedin.com/blog/member/trust-and-safety/updates-to-our-terms-of-service-2024&quot;&gt;changes&lt;/a&gt; to its AI policy, so it is no longer training genAI models using &lt;i&gt;UK &lt;/i&gt;users&#39; data (&lt;a href=&quot;https://www.linkedin.com/mypreferences/d/settings/data-for-ai-improvement&quot;&gt;opt-out link&lt;/a&gt;&amp;nbsp;for others). There was separately an &lt;a href=&quot;https://www.bbc.co.uk/news/articles/cj4d5jjqg2qo&quot;&gt;AI opt-out hoax&lt;/a&gt;&amp;nbsp;that fooled a lot of people!&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEiI-s0r7OaorOjJ_ibRxHS8t1xj9XtOv0owrpEOKwgj-xv4lRCB7Ej2gepeIq7V51F2SIlYVvEpGpSb8UMMImhlOBIwIv1YTqekvlPffBXGrXSxXbAgzQEw-1_TDOEXzHD-P5aiiphagv8ykj1zWH_jxzXawVjG3Ay9Ar1XExkOAt9zGZ754mHnQAPcWSY&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;586&quot; data-original-width=&quot;400&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEiI-s0r7OaorOjJ_ibRxHS8t1xj9XtOv0owrpEOKwgj-xv4lRCB7Ej2gepeIq7V51F2SIlYVvEpGpSb8UMMImhlOBIwIv1YTqekvlPffBXGrXSxXbAgzQEw-1_TDOEXzHD-P5aiiphagv8ykj1zWH_jxzXawVjG3Ay9Ar1XExkOAt9zGZ754mHnQAPcWSY&quot; width=&quot;164&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/government/news/ministry-of-defence-analyses-future-global-strategic-trends&quot;&gt;recently-published&lt;/a&gt;&amp;nbsp;UK MoD&#39;s&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/government/publications/global-strategic-trends-out-to-2055&quot;&gt;annual analysis of future global strategic trends 2024&lt;/a&gt;&amp;nbsp;mentions cyber and AI, of course. UK civil servants (but not the rest of us!) are being &lt;a href=&quot;https://www.gov.uk/government/news/new-courses-on-artificial-intelligence-launched&quot;&gt;offered&lt;/a&gt; free training AI-related courses, covering various aspects of AI, illustrating what&#39;s considered most important: Fundamentals, Understanding AI Ethics, The business value of AI, Gen AI Tools and Applications, Working with Large Language Models, Machine Learning and Deep Learning, Natural Language Processing and Speech Recognition, Computer Vision, and a Technical Curriculum.&lt;/p&gt;&lt;p&gt;Separately, &lt;a href=&quot;https://www.gov.uk/ai-assurance-techniques&quot;&gt;case studies&lt;/a&gt; summarised based on the &lt;a href=&quot;https://www.gov.uk/guidance/portfolio-of-ai-assurance-techniques&quot;&gt;DSIT AI assurance techniques&lt;/a&gt; have been boosted by the addition of more products/platforms, on areas from governance, facial recognition e.g. for verification/identification, compliance management and bias assessment (even for NIST AI RMF, ISO, and NYC 144 bias audit with synthetic data!) to AI monitoring/audit. If you&#39;re planning to offer AI products to government (or beyond), it wouldn&#39;t be a bad idea to get your own products assured and listed similarly.&lt;/p&gt;&lt;p&gt;&lt;b&gt;AI uses in the UK&lt;/b&gt;: a great use is&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/government/news/autonomous-robot-paves-the-way-for-future-fusion-maintenance&quot;&gt;autonomous robots to maintain fusion facilities&lt;/a&gt;. On &lt;b&gt;health&lt;/b&gt;, a &quot;novel ... AI tool, validated using NHS eye imaging datasets... could transform the efficiency of &lt;a href=&quot;https://www.insight.hdrhub.org/post/nhs-data-enables-ai-model-for-optimising-diabetic-eye-screening&quot;&gt;screening for Diabetic Retinopathy (DR)&lt;/a&gt;&quot;, while the MHRA&amp;nbsp;&amp;nbsp;is &lt;a href=&quot;https://www.gov.uk/government/news/mhra-opens-applications-from-ai-developers-to-join-the-ai-airlock-regulatory-sandbox&quot;&gt;calling&lt;/a&gt; for applications for manufacturers and developers of &lt;b&gt;AI medical devices&lt;/b&gt; to join its AI Airlock regulatory sandbox; and, &lt;a href=&quot;https://digitalregulations.innovation.nhs.uk/blog/reflections-on-building-the-ai-and-digital-regulations-service/&quot;&gt;Reflections on building the AI and Digital Regulations Service&lt;/a&gt;. Added: &lt;a href=&quot;https://www.gov.uk/government/news/ai-signs-for-citizen-science-to-be-used-at-south-west-beaches&quot;&gt;AI platform via QR code&lt;/a&gt; for citizen science info on bathing water quality in Devon and Cornwall.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.gov.uk/government/news/uk-us-and-canada-to-collaborate-on-cybersecurity-and-ai-research&quot;&gt;&lt;b&gt;Collaboration&amp;nbsp;&lt;/b&gt;on cybersecurity and AI research&lt;/a&gt;&amp;nbsp;announced between the UK, US and Canada, to support defence and security&lt;/p&gt;&lt;p&gt;&lt;b&gt;Equality, AI&lt;/b&gt;:&amp;nbsp;&lt;a href=&quot;https://www.equalityhumanrights.com/guidance/public-sector-equality-duty-and-data-protection&quot;&gt;The public sector equality duty and data protection&lt;/a&gt;, Sept 2024, UK EHRC guidance (with ICO input), including helpful examples of&amp;nbsp;&lt;b&gt;proxy data&lt;/b&gt;&amp;nbsp;for protected characteristics under the UK Equality Act 2010, and a short section on&amp;nbsp;&lt;b&gt;proxy analysis of AI models&lt;/b&gt;, with a case study on the Dutch benefit fraud scandal that led to unlawful discriminatinon (from using biased predictive algorithms)&lt;/p&gt;&lt;p&gt;&lt;b&gt;United Nations&lt;/b&gt;: much activity on AI, such as the final &lt;a href=&quot;https://www.un.org/sites/un2.un.org/files/governing_ai_for_humanity_final_report_en.pdf&quot;&gt;Governing AI for Humanity&lt;/a&gt; report on global AI governance, gaps, and international cooperation.&lt;/p&gt;&lt;p&gt;The recently (and almost simultaneously) promulgated&amp;nbsp;&lt;a href=&quot;https://www.un.org/techenvoy/global-digital-compact&quot;&gt;&lt;b&gt;UN Digital Compact&lt;/b&gt;&lt;/a&gt;&amp;nbsp;is &quot;a comprehensive framework for global governance of digital technology and artificial intelligence&quot;:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Objectives&lt;/b&gt; agreed included: &quot;Enhance international governance of artificial intelligence for the benefit of humanity&quot;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Principles&lt;/b&gt; agreed included: &quot;Safe, secure and trustworthy emerging technologies, including artificial intelligence, offer new opportunities to turbocharge development. Our cooperation will advance a responsible, accountable, transparent and human-centric approach to the life cycle of digital and emerging technologies, which includes the pre-design, design, development, evaluation, testing, deployment, use, sale, procurement, operation and decommissioning stages, with effective human oversight&quot;&lt;/li&gt;&lt;li&gt;On&amp;nbsp;&lt;b&gt;Digital public goods and digital public infrastructure&lt;/b&gt;: &quot;We recognize that digital public goods, which include open-source software, open data, &lt;b&gt;open artificial intelligence models&lt;/b&gt;, open standards and open content that adhere to privacy and other applicable international laws, standards and best practices and do no harm, empower societies and individuals to direct digital technologies to their development needs and can facilitate digital cooperation and investment... ...We commit by, 2030, to: (a) Develop, disseminate and maintain, through multi-stakeholder cooperation, safe and secure open-source software, open data, &lt;b&gt;open artificial intelligence models&lt;/b&gt; and open standards that benefit society as a whole (SDGs [Sustainable Development Goals] 8, 9 and 10)&lt;/li&gt;&lt;li&gt;On&amp;nbsp; &lt;b&gt;Objective 3. Foster an inclusive, open, safe and secure digital space that respects, protects and promotes human rights&lt;/b&gt;, they &quot;urgently... Call on digital technology companies and developers to continue to develop solutions and publicly communicate actions to counter potential harms, including hate speech and discrimination, from &lt;b&gt;artificial intelligence-enabled content&lt;/b&gt;. Such measures include incorporation of &lt;b&gt;safeguards into artificial intelligence model training processes, identification of artificial intelligence-generated material, authenticity certification for content and origins, labelling, watermarking and other techniques&lt;/b&gt; (SDGs 10, 16 and 17).&lt;/li&gt;&lt;li&gt;On &lt;b&gt;Objective 4. Advance responsible, equitable and interoperable data governance approaches&lt;/b&gt;, data privacy and security, &quot;We recognize that responsible and interoperable data governance is essential to advance development objectives, protect human rights, foster innovation and promote economic growth. The increasing collection, sharing and processing of data, including in &lt;b&gt;artificial intelligence systems&lt;/b&gt;, may amplify risks in the absence of effectivepersonal data protection and privacy norms...&lt;br /&gt;...We commit, &lt;b&gt;by 2030,&lt;/b&gt; to: (a) Draw on existing international and regional guidelines on the protection of privacy in the development of data governance frameworks (all SDGs); (b) Strengthen support to all countries to develop effective and interoperable national data governance frameworks (all SDGs); (c) Empower individuals and groups with the &lt;b&gt;ability to consider, give and withdraw their consent&lt;/b&gt; to the use of their data and the ability to choose how those data are used, including through &lt;b&gt;legally mandated protections for data privacy and intellectual property&lt;/b&gt; (SDGs 10 and 16); (d) Ensure that data collection, access, sharing, transfer, storage and processing practices are safe, secure and proportionate for necessary, explicit and legitimate purposes, in compliance with international law (all SDGs); (e) Develop skilled workforces capable of collecting, processing, analysing, storing and transferring data safely in ways that protect privacy (SDGs 8 and 9)&lt;/li&gt;&lt;li&gt;And &lt;b&gt;Objective 5&lt;/b&gt;&amp;nbsp;was all about AI governance, not quoted in full here but&lt;br /&gt;&quot;We will: (a) Assess the future directions and implications of artificial intelligence systems and promote scientific understanding (all SDGs); (b) Support &lt;b&gt;interoperability and compatibility&lt;/b&gt; of artificial intelligence governance approaches through sharing best practices and promoting common understanding (all SDGs); (c) Help to build capacities, especially in developing countries, to access, develop, use and govern artificial intelligence systems and direct them towards the pursuit of sustainable development (all SDGs); (d) Promote &lt;b&gt;transparency, accountability and robust human oversight&lt;/b&gt; of artificial intelligence systems in compliance with international law (all SDGs). (Also see UNESCO&#39;s &lt;a href=&quot;https://www.unesco.org/en/articles/unesco-launches-open-consultation-inform-ai-governance&quot;&gt;consultation&lt;/a&gt; from Aug-Sept 2024&amp;nbsp; with a &lt;a href=&quot;https://unesdoc.unesco.org/ark:/48223/pf0000390979&quot;&gt;policy brief&lt;/a&gt; summarising emerging regulatory approaches to AI.)&lt;/li&gt;&lt;li&gt;We therefore commit to: (a) Establish, within the United Nations, a multidisciplinary Independent &lt;b&gt;International Scientific Panel on AI&lt;/b&gt; with balanced geographic representation to promote scientific understanding through evidence-based impact, risk and opportunity assessments, drawing on existing national, regional and international initiatives and research networks (SDG 17); (b) Initiate, within the United Nations, a &lt;b&gt;Global Dialogue on AI Governance&lt;/b&gt; involving Governments and all relevant stakeholders which will take place in the margins of existing relevant United Nations conferences and meetings (SDG 17).&quot;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;div&gt;&lt;b&gt;US:&lt;/b&gt;&amp;nbsp;&lt;a href=&quot;https://www.state.gov/wp-content/uploads/2024/09/Global_AI_Research_Agenda.pdf&quot;&gt;global AI research agenda&lt;/a&gt;;&amp;nbsp;&lt;a href=&quot;https://www.bis.gov/press-release/commerce-proposes-reporting-requirements-frontier-ai-developers-and-compute-providers&quot;&gt;proposed&lt;/a&gt;&amp;nbsp;&lt;a href=&quot;https://www.federalregister.gov/documents/2024/09/11/2024-20529/establishment-of-reporting-requirements-for-the-development-of-advanced-artificial-intelligence&quot;&gt;Reporting Requirements for the Development of Advanced Artificial Intelligence Models and Computing Clusters&lt;/a&gt; (i.e. cloud providers); &quot;This includes reporting about developmental activities, cybersecurity measures, and outcomes from red-teaming efforts, which involve testing for dangerous capabilities like the ability to assist in cyberattacks or lower the barriers to entry for non-experts to develop chemical, biological, radiological, or nuclear weapons.&quot; One I missed earlier: the IAF&#39;s paper on &lt;a href=&quot;https://b1f827.p3cdn1.secureserver.net/wp-content/uploads/2024/09/Assessments-in-an-AI-World-Requirements-for-US-State-Privacy-Laws-FINAL-w-corrected-link.pdf&quot;&gt;Risk/Data Protection Assessment (for AI) as Required by U.S. State Privacy Laws&lt;/a&gt;.&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;b&gt;US FTC:&lt;/b&gt;&amp;nbsp;action&amp;nbsp;&lt;a href=&quot;https://www.ftc.gov/news-events/news/press-releases/2024/09/ftc-announces-crackdown-deceptive-ai-claims-schemes&quot;&gt;against&lt;/a&gt;&amp;nbsp;&quot;multiple companies that have relied on artificial intelligence as a way to supercharge deceptive or unfair conduct that harms consumers... include actions against a company promoting an AI tool that enabled its customers to create fake reviews, a company claiming to sell “AI Lawyer” services, and multiple companies claiming that they could use AI to help consumers make money through online storefronts.&quot;&amp;nbsp;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;And some miscellaneous things...&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Hallucination&lt;/b&gt;&amp;nbsp;issues with LLMs remain: a recent&amp;nbsp;&lt;a href=&quot;https://theconversation.com/why-microsofts-copilot-ai-falsely-accused-court-reporter-of-crimes-he-covered-237685&quot;&gt;egregious example&lt;/a&gt;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Comparing chatbots&lt;/b&gt;: interesting open-source&amp;nbsp;&lt;a href=&quot;https://lmarena.ai/&quot;&gt;tool to compare&lt;/a&gt;&amp;nbsp;different (anonymized) chatbots by asking them the same questions, and do choose the best answer. See its &lt;a href=&quot;https://lmarena.ai/?leaderboard&quot;&gt;leaderboard&lt;/a&gt;, currently OpenAI&#39;s o1-preview is top!&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Cognitive bias&lt;/b&gt;: humans tend to think fluent content (e.g. LLM-generated) is more truthful/useful than less fluent content, which can produce systematic errors.&amp;nbsp;&amp;nbsp;Of course, this tendency is why even hallucinationary genAI output can be trusted and believed by humans!AWS scientists &lt;a href=&quot;https://www.amazon.science/blog/accounting-for-cognitive-bias-in-human-evaluation-of-large-language-models&quot;&gt;argue&lt;/a&gt; &lt;a href=&quot;https://www.amazon.science/publications/considers-the-human-evaluation-framework-rethinking-human-evaluation-for-generative-large-language-models&quot;&gt;that&lt;/a&gt; &quot;human evaluation of generative large language models (LLMs) should be a multidisciplinary undertaking that draws upon insights from disciplines such as user experience research and human behavioral psychology&quot;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;AI users&lt;/b&gt;: apparently have a &lt;a href=&quot;https://www.hp.com/us-en/newsroom/press-releases/2024/2024-hp-work-relationship-index.html&quot;&gt;healthier relationship with work&lt;/a&gt;&amp;nbsp;than colleagues who &lt;i&gt;don&#39;t&lt;/i&gt; use AI! Although of course AI has been the reason for some &lt;a href=&quot;https://www.bbc.co.uk/news/articles/c80e1gp9m9zo&quot;&gt;job cuts&lt;/a&gt;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Interesting article on&amp;nbsp;&lt;a href=&quot;https://ai.gopubby.com/i-studied-the-last-200-years-boom-bust-tech-cycles-this-is-how-they-related-to-ai-hype-b18ede8ca546&quot;&gt;AI hype&lt;/a&gt;&amp;nbsp;and another on the &lt;a href=&quot;https://towardsdatascience.com/strawberrys-paradox-when-perfect-answers-aren-t-enough-a4e3414eadc0&quot;&gt;importance of human thought and judgment&lt;/a&gt;&amp;nbsp;when using AI.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;ADDED:&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;https://dataandtrustalliance.org/work/data-provenance-standards&quot;&gt;D&amp;amp;TA Data Provenance Standards&lt;/a&gt; v1.0.0 (&lt;a href=&quot;https://github.com/Data-and-Trust-Alliance/DPS&quot;&gt;GitHub&lt;/a&gt;)&amp;nbsp;&lt;a href=&quot;https://dataandtrustalliance.org/news/announcing-the-data-provenance-standards-v1-0-0&quot;&gt;from&lt;/a&gt; the&amp;nbsp;Data &amp;amp; Trust Alliance (&lt;a href=&quot;https://assets.ctfassets.net/b9fqy5fsj3oi/5SIIAFf0wpurPhjDiSC7Ju/ba6ab6a25aeeba81ec62904486cb215f/Data_Provenance_Standards_Executive_Overview_July_2024.pdf&quot;&gt;exec overview&lt;/a&gt;), partnering with &lt;a href=&quot;https://www.oasis-open.org/&quot;&gt;OASIS&lt;/a&gt;. These are billed as &quot;the first cross-industry &lt;b&gt;metadata &lt;/b&gt;standards to bring transparency to the origin of datasets used for both traditional data and AI applications&quot;: &lt;a href=&quot;https://downloads.ctfassets.net/b9fqy5fsj3oi/37mIPyZhfzofPl8InQKUME/7cdd1cbdaa82e8083fba5fc13c0cd128/D_TA_Data_Provenance_Standards_Use_Case_Scenarios_v01td_-_Reduced.pdf&quot;&gt;use case scenarios&lt;/a&gt;, online &lt;a href=&quot;https://data-and-trust-alliance-data-provenance-standards.northeurope.cloudapp.azure.com/&quot;&gt;metadata generator&lt;/a&gt;. Supporters include (from the tech sector) IBM, Meta and Salesforce, but also many from the manufacturing industry. (See also &lt;a href=&quot;https://c2pa.org/&quot;&gt;C2PA, Coalition for Content Provenance &amp;amp; Authenticity&lt;/a&gt;, on &quot;An open technical standard providing publishers, creators, and consumers the ability to &lt;b&gt;trace the origin&lt;/b&gt; of different types of media&quot;).&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;b&gt;Facial recognition &amp;amp; privacy / personal data&lt;/b&gt;: interesting and scary,&amp;nbsp;&lt;a href=&quot;https://news.sky.com/story/students-adapt-metas-smart-glasses-to-dox-strangers-in-real-time-13227034&quot;&gt;students managed to adapt smart glasses&lt;/a&gt;&amp;nbsp;to look up info on strangers in real-time, including parents&#39; names!&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;(Also see my separate blogs on &lt;a href=&quot;https://blog.kuan0.com/2024/10/things-data-protection-privacy-some-ai.html&quot;&gt;privacy / data protection&lt;/a&gt; and on &lt;a href=&quot;https://blog.kuan0.com/2024/10/things-cyber-security-summer-sept-2024.html&quot;&gt;security&lt;/a&gt;: links now added.)&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/1351522865372242230'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/1351522865372242230'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2024/09/things-ai-sept-2024.html' title='Things AI, Sept 2024'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEiI-s0r7OaorOjJ_ibRxHS8t1xj9XtOv0owrpEOKwgj-xv4lRCB7Ej2gepeIq7V51F2SIlYVvEpGpSb8UMMImhlOBIwIv1YTqekvlPffBXGrXSxXbAgzQEw-1_TDOEXzHD-P5aiiphagv8ykj1zWH_jxzXawVjG3Ay9Ar1XExkOAt9zGZ754mHnQAPcWSY=s72-c" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-1076043520856691102</id><published>2024-09-16T17:01:00.004+01:00</published><updated>2024-09-16T17:04:34.830+01:00</updated><title type='text'>Browser cookie settings &amp; consumer preferences - UK study</title><content type='html'>&lt;p&gt;&lt;a href=&quot;https://assets.publishing.service.gov.uk/media/660d15f338f66c001184a95d/BIT_Evaluating_browser-based_cookie_settings_report.pdf&quot;&gt;&quot;Evaluating browser-based cookie setting options to help the UK public optimise online privacy behaviours&quot; (PDF)&lt;/a&gt;, a study for the UK Department for Science,&amp;nbsp;Innovation and Technology&amp;nbsp;on consumer preferences &lt;a href=&quot;https://www.gov.uk/government/publications/evaluating-browser-based-cookie-setting-options&quot;&gt;conducted&amp;nbsp; between Aug and Dec 2023&lt;/a&gt;, concluded that:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;&quot;...We recommend that any future cookie setting option should be interactive and detailed to a sufficient level that participants understand the real-world impact of accepting or declining a number of different options, e.g. that ‘functional’ cookies include login details, website preferences (language, currency), see Appendix 2, Figure 5. These setting designs secure stronger engagement by breaking participants out of the habit of automatically accepting all cookies purely for the sake of expedient access to the browser; furthermore, participants are satisfied after such a process of critical engagement...&lt;/p&gt;&lt;/blockquote&gt;&lt;blockquote&gt;&lt;p&gt;...People remain divided over the idea of browser-based cookies. To improve sentiment, any future browser-based cookie settings should include features that will enhance web users’ feelings of control over their data (e.g. frequent prompts for updates, options to adapt preferences by types of websites, or for specific websites).&lt;/p&gt;&lt;p&gt;Participant engagement and satisfaction improved when they had access to more functionality details, an interactive interface to select their preferences, and timely prompting about privacy. As a result, should browser based cookie management systems replace the website level settings, we recommend that browser-based cookie setting design should attempt to disrupt users’ habits of automatically accepting through novel designs to create a dissonance with what they are used to seeing. Furthermore, any cookie settings that encourage participants to make a privacy-protective choice will lead to higher satisfaction regardless of initial preferences.&quot;&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;But if there&#39;s too much detail in the expanded info, users may just ignore them. And I&#39;m not so sure about frequent prompts to users... that doesn&#39;t provide a great user experience. Strictly, when users have accepted cookies for a site, they should probably be told about their right to &lt;b&gt;&lt;i&gt;withdraw&lt;/i&gt;&lt;/b&gt; consent to cookies everytime they return to the site, but that doesn&#39;t really happen, at least not in a &quot;disruptive&quot; way, presumably because that&#39;s not great for UX too (popups continuing to appear even if you&#39;ve accepted cookies previously?!).&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/1076043520856691102'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/1076043520856691102'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2024/09/browser-cookie-settings-consumer.html' title='Browser cookie settings &amp; consumer preferences - UK study'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-1552177257040225728</id><published>2024-09-16T09:00:00.037+01:00</published><updated>2024-09-16T09:41:08.897+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ADM"/><category scheme="http://www.blogger.com/atom/ns#" term="AI"/><category scheme="http://www.blogger.com/atom/ns#" term="AI Act"/><category scheme="http://www.blogger.com/atom/ns#" term="AI liability"/><category scheme="http://www.blogger.com/atom/ns#" term="AI Pact"/><category scheme="http://www.blogger.com/atom/ns#" term="AI risks"/><category scheme="http://www.blogger.com/atom/ns#" term="AI treaty"/><category scheme="http://www.blogger.com/atom/ns#" term="artificial intelligence"/><category scheme="http://www.blogger.com/atom/ns#" term="automated decision-making"/><category scheme="http://www.blogger.com/atom/ns#" term="Council of Europe"/><category scheme="http://www.blogger.com/atom/ns#" term="generative AI"/><category scheme="http://www.blogger.com/atom/ns#" term="HUDERIA"/><title type='text'>AI and GPAI developments/info, Sept 2024</title><content type='html'>&lt;div&gt;Some AI-related links, which I hope will be of use:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;✨&lt;a href=&quot;https://ec.europa.eu/newsroom/dae/redirection/document/107430&quot;&gt;Final text of AI Pact pledges&lt;/a&gt;, promulgated by the European Commission to get tech companies to comply voluntarily with (at least some of) the AI Act before its formal applicable date. So, the text is not dissimilar from that of the EU AI Act, and indeed the G7 Principles from the &lt;a href=&quot;https://www.digital.go.jp/en/a11b8177-e3a3-4029-b3c0-1fbcb77b59ba-en&quot;&gt;Hiroshima Process&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;✨&lt;a href=&quot;https://www.youtube.com/playlist?list=PLgrQeHXIMX5MNuEZiwf9PPKdKCWP9YhiN&quot;&gt;Human oversight of ADM / automated decision-making&lt;/a&gt;: videos from the &lt;a href=&quot;https://www.edps.europa.eu/data-protection/technology-monitoring/ipen/ipen-event-human-oversight-automated-making_en&quot;&gt;EDPS&#39;s workshop&lt;/a&gt;, 3 Sept 24&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;div&gt;✨&lt;a href=&quot;https://www.europarl.europa.eu/RegData/etudes/BRIE/2021/698792/EPRS_BRI%282021%29698792_EN.pdf&quot;&gt;AI Act briefing&lt;/a&gt; for European Parliament, 2 Sept 24&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;✨BSA (The Software Alliance) &lt;a href=&quot;https://www.bsa.org/policy-filings/best-practices-for-information-sharing-along-the-general-purpose-ai-value-chain&quot;&gt;Best  Practices for Information Sharing Along the General Purpose AI Value Chain&lt;/a&gt;. There&#39;s some overlap with the EU AI Act&#39;s GPAI requirements, 3 Sept 24&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;✨Computer &amp;amp; Communications Industry Association&#39;s&amp;nbsp;&lt;a href=&quot;https://ccianet.org/wp-content/uploads/2024/09/AIA-Code-Practice_Opportunities-Challenges.pdf&quot;&gt;recommendations on GPAI code of practice&lt;/a&gt;, Aug 24&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;✨Note that the &lt;a href=&quot;https://www.coe.int/en/web/conventions/full-list?module=treaty-detail&amp;amp;treatynum=225&quot;&gt;Council of Europe&#39;s AI Treaty&lt;/a&gt;, signed by the &lt;a href=&quot;https://www.gov.uk/government/news/uk-signs-first-international-treaty-addressing-risks-of-artificial-intelligence&quot;&gt;UK&lt;/a&gt;, &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/news/commission-signs-council-europe-framework-convention-artificial-intelligence&quot;&gt;EU&lt;/a&gt; and others, will come into force &lt;a href=&quot;https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature&quot;&gt;only&lt;/a&gt; on the first day of the month following the 3-month period after 5 signatories, including at least 3 Council of Europe member states, have ratified it. (On treaties/conventions, see the differences between &lt;a href=&quot;https://ask.un.org/faq/14594&quot;&gt;signing versus ratification versus accession&lt;/a&gt;).&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;To support the Treaty&#39;s implementation, the COE&#39;s HUDERIA is a &quot;legally non-binding methodology&quot; for Risk &amp;amp; Impact Assessment of AI Systems for Human Rights, Democracy and Rule of Law (&lt;a href=&quot;https://rm.coe.int/20240704-ecn-9-2024-webinar-huderia/1680b0d26c&quot;&gt;good summary&lt;/a&gt;). The UK&#39;s Alan Turing Institute &lt;a href=&quot;https://www.turing.ac.uk/research/research-projects/human-rights-democracy-and-rule-law-impact-assessment-ai-systems-huderia&quot;&gt;is assisting&lt;/a&gt; on HUDERIA. The COE &lt;a href=&quot;https://www.coe.int/en/web/artificial-intelligence/cai&quot;&gt;Committee on AI&lt;/a&gt; is &lt;a href=&quot;https://rm.coe.int/cai-2024-oj2-draft-agenda/1680b0d65f&quot;&gt;considering&lt;/a&gt; HUDERIA soon. The European Commission &amp;amp; Council of the European Union &lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-11364-2024-INIT/en/pdf&quot;&gt;are&lt;/a&gt; &lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-12053-2024-INIT/en/pdf&quot;&gt;also&lt;/a&gt; &lt;a href=&quot;https://data.consilium.europa.eu/doc/document/CM-4054-2024-INIT/en/pdf&quot;&gt;involved&lt;/a&gt;. What&#39;s the betting as to how much HUDERIA will influence what is going to be required in Fundamental Rights Assessments for certain high-risk AI systems under the AI Act?&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;(Compare the US Department of State&#39;s &lt;a href=&quot;https://www.state.gov/risk-management-profile-for-ai-and-human-rights/&quot;&gt;risk management profile for AI and human rights&lt;/a&gt;, July 2024)&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;✨&lt;a href=&quot;https://www.gartner.com/en/newsroom/press-releases/2024-07-29-gartner-predicts-30-percent-of-generative-ai-projects-will-be-abandoned-after-proof-of-concept-by-end-of-2025&quot;&gt;Gartner Predicts 30% of Generative AI Projects Will Be Abandoned After Proof of Concept By End of 2025&lt;/a&gt;. Certainly, &lt;a href=&quot;https://lnkd.in/efXK2dC4&quot;&gt;genai risk disclosures in US SEC filings are increasing&lt;/a&gt;.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;✨A data scientist has written a &lt;a href=&quot;https://www.stephaniekirmer.com./writing/dosomethingwithai/&quot;&gt;great outline of a practical approach in the face of the pressure to to AI-ify&lt;/a&gt; everything ASAP. Consider, is using AI always the best solution? Especially given that AI systems will increasingly be subject to more onerous obligations than non-AI systems (e.g. under the AI Act), is it always best to use AI when non-AI approaches/methods could work equally well or perhaps better?&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;✨What&#39;s up with the planned AI Liability Directive? It won&#39;t automatically be brought into force, but&amp;nbsp; a June Parliamentary Committee report &lt;a href=&quot;https://www.europarl.europa.eu/cmsdata/284734/9th%20legislature_JURI%20Activity%20Report%202019-2024.pdf&quot;&gt;stated that&lt;/a&gt; &quot;the legislative work under the leadership of the Committee on Legal Affairs... will continue under the new Parliament. In the meantime, the
Committee... requested an additional impact assessment from the European
Parliament Research Service (EPRS). It is to primarily deal with the compatibility of the three legal acts mentioned [AIAct, product liability etc] and the risk-based concept and is expected to be completed by the end of 2024&quot;. Note the date for the additional impact assessment - end of 2024. So it&#39;s very unlikely this Directive will be passed this year, perhaps ever.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;(I had tried to post the above on LinkedIn last Thursday, please see &lt;a href=&quot;https://www.linkedin.com/posts/wkhon_what-is-the-difference-between-signing-ratification-activity-7239922305378766848--0bE&quot;&gt;this AI developments post&lt;/a&gt;, but LinkedIn saw fit to demote it and not show it in people&#39;s feeds, so I think it&#39;s best to blog here instead, and at least there&#39;s space for me to flesh things out a bit more here.)&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/1552177257040225728'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/1552177257040225728'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2024/09/ai-and-gpai-developmentsinfo-sept-2024.html' title='AI and GPAI developments/info, Sept 2024'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-4178027819502891165</id><published>2024-04-14T17:45:00.010+01:00</published><updated>2024-04-14T17:52:18.780+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AI"/><category scheme="http://www.blogger.com/atom/ns#" term="AI principles"/><category scheme="http://www.blogger.com/atom/ns#" term="artificial intelligence"/><category scheme="http://www.blogger.com/atom/ns#" term="standards"/><title type='text'>Are AI principles like standards?</title><content type='html'>&lt;p&gt;&amp;nbsp;AI principles, indeed AI standards, seem to be ever proliferating...&lt;/p&gt;

&lt;iframe allow=&quot;autoplay&quot; height=&quot;1200&quot; src=&quot;https://drive.google.com/file/d/1MW2KA7_fGlFz0LlNh89vJ3qxM5B-RYOf/preview&quot; width=&quot;640&quot;&gt;&lt;/iframe&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/4178027819502891165'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/4178027819502891165'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2024/04/are-ai-principles-like-standards.html' title='Are AI principles like standards?'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-767857059366734162</id><published>2023-08-23T11:25:00.011+01:00</published><updated>2024-07-31T11:39:55.365+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="age assurance"/><category scheme="http://www.blogger.com/atom/ns#" term="age checking"/><category scheme="http://www.blogger.com/atom/ns#" term="age verification"/><category scheme="http://www.blogger.com/atom/ns#" term="biometrics"/><category scheme="http://www.blogger.com/atom/ns#" term="certifications"/><category scheme="http://www.blogger.com/atom/ns#" term="children"/><category scheme="http://www.blogger.com/atom/ns#" term="data protection"/><category scheme="http://www.blogger.com/atom/ns#" term="drcf"/><category scheme="http://www.blogger.com/atom/ns#" term="ico"/><category scheme="http://www.blogger.com/atom/ns#" term="ofcom"/><category scheme="http://www.blogger.com/atom/ns#" term="privacy"/><category scheme="http://www.blogger.com/atom/ns#" term="uk"/><title type='text'>Age assurance/verification technologies &amp; privacy/data protection</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Key ICO resources and UK info/standards on age checking/assurance &amp;amp; the Children&#39;s Code are below.&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;a name=&quot;OpenAt&quot;&gt;&lt;/a&gt;&lt;span lang=&quot;EN-GB&quot;&gt;ICO work to date on children&#39;s privacy and age estimation/verification:&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;a href=&quot;https://www.drcf.org.uk/publications/papers/measurement-of-age-assurance-technologies&quot;&gt;Measurement of age assurance technololgies&lt;/a&gt;, jointly commissioned with Ofcom under the Digital Regulation Cooperation Forum (DRCF), Aug 23 (previous report &lt;a href=&quot;https://ico.org.uk/media/about-the-ico/documents/4021822/measurement-of-age-assurance-technologies.pdf&quot;&gt;pt.1&lt;/a&gt;, Oct 22)&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span lang=&quot;EN-GB&quot;&gt;ICO-approved certifications under UK GDPR in 2021 include (&lt;a href=&quot;https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2021/08/ico-approves-the-first-uk-gdpr-certification-scheme-criteria/&quot;&gt;news release&lt;/a&gt;)&lt;/span&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Age Check Certification Scheme (ACCS) &lt;a href=&quot;https://ico.org.uk/for-organisations/advice-and-services/certification-schemes/certification-scheme-register/age-check-certification-scheme-accs/&quot;&gt;testing age assurance products work&lt;/a&gt;&amp;nbsp;(tech requirements &lt;a href=&quot;https://ico.org.uk/media/for-organisations/documents/2620426/accs-2-2021-technical-requirements-aadc.pdf&quot;&gt;ACCS 2:2021&lt;/a&gt;)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Age Appropriate Design Certification Scheme (AADCS) &lt;a href=&quot;https://ico.org.uk/for-organisations/advice-and-services/certification-schemes/certification-scheme-register/age-appropriate-design-certification-scheme-aadcs/&quot;&gt;criteria for age appropriatedesign of information society services&lt;/a&gt; (tech requirements &lt;a href=&quot;https://ico.org.uk/media/for-organisations/documents/2620427/accs-3-2021-technical-requirements-aadc.pdf&quot;&gt;ACCS 3:2021&lt;/a&gt;)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span lang=&quot;EN-GB&quot;&gt;(I mention this first as many people don&#39;t seem to know about them)&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;a href=&quot; https://ico.org.uk/media/about-the-ico/documents/childrens-code/4025494/childrens-code-evaluation-report.pdf&quot;&gt;Evaluation report&lt;/a&gt; on Children&#39;s Code &amp;amp; &lt;a href=&quot;https://ico.org.uk/media/about-the-ico/documents/childrens-code/4025495/childrens-code-summary-document.pdf&quot;&gt;summary&lt;/a&gt;, Mar 23&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;a href=&quot;https://ico.org.uk/media/about-the-ico/consultations/4023900/20230203-response-to-aa-cfe-and-roundtables-v1_1.pdf &quot;&gt;Response to the Call for Evidence and roundtables on age assurance&lt;/a&gt;, Feb 23&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;a href=&quot;https://ico.org.uk/media/about-the-ico/documents/4018659/age-assurance-opinion-202110.pdf &quot;&gt;Age assurance opinion&lt;/a&gt;, Oct 21&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Seers &lt;a href=&quot;https://ico.org.uk/media/for-organisations/documents/4018590/seers-regulatory-sandbox-final-report-final.pdf &quot;&gt;Child Privacy Consent Management Platform (CPCMP) sandbox report&lt;/a&gt;,&amp;nbsp;Oct 21&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Yubo &lt;a href=&quot;https://ico.org.uk/media/action-weve-taken/audits-and-advisory-visits/4023906/yubo-exec-summary-20230210.pdf &quot;&gt;Age Appropriate Design Code Audit Report&lt;/a&gt;, Oct 22&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Yoti &lt;a href=&quot;https://ico.org.uk/media/for-organisations/documents/4020427/yoti-sandbox-exit_report_20220522.pdf&quot;&gt;age estimation tech for younger children sandbox report&lt;/a&gt;, Apr 22 &amp;amp; its &lt;a href=&quot;https://ico.org.uk/media/action-weve-taken/audits-and-advisory-visits/4019830/age-appropriate-design-code-yoti-app-audit-report-executive-summary-v1_0.pdf   &quot;&gt;AADC audit&lt;/a&gt;, Dec 21&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;a href=&quot;https://ico.org.uk/media/for-organisations/guide-to-data-protection/key-data-protection-themes/age-appropriate-design-a-code-of-practice-for-online-services-2-1.pdf&quot;&gt;Age-AppropriateDesign Code&lt;/a&gt; itself&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Also relevant:&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;European Commission&#39;s &lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/news/celebrating-2nd-anniversary-bik-strategy&quot;&gt;age assurance tool,&lt;/a&gt; May 24&lt;/li&gt;&lt;li&gt;Ofcom&#39;s &lt;a href=&quot;https://www.ofcom.org.uk/online-safety/information-for-industry/guide-for-services/quick-guide-to-childrens-access-assessments&quot;&gt;Quick guide to children’s access assessments&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.ofcom.org.uk/__data/assets/pdf_file/0032/284486/vol5-what-should-services-do-to-mitigate-risks.pdf&quot;&gt;Protecting children from harms online Volume 5: What should services do to mitigate the risks of online harms to children?&lt;/a&gt;, section 15&amp;nbsp;Age assurance measures, and Ofcom&#39;s Annex 10 &lt;a href=&quot;https://www.ofcom.org.uk/__data/assets/pdf_file/0034/284488/a10-15-other-annexes.pdf&quot;&gt;A10. Draft guidance on highly effective age assurance&lt;/a&gt;, May 24&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.ofcom.org.uk/__data/assets/pdf_file/0018/272601/guidance-part-5-annexe-2.pdf&quot;&gt;Ofcom&#39;s Guidance on age assurance and other Part 5 duties for service providers publishing pornographic content on online services&lt;/a&gt;&amp;nbsp;(under UK Online Safety Act 2023), Dec 23&lt;/li&gt;&lt;li&gt;UK&#39;s 2022 &lt;a href=&quot;https://www.gov.uk/government/publications/age-verification-technology-in-alcohol-sales-regulatory-sandbox&quot;&gt;trials of age verification technology in alcohol sales&lt;/a&gt;&amp;nbsp;- interestingly, several using Yoti&#39;s age estimation tech - mostly facial, some ID documents, one biometric finger vein&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://knowledge.bsigroup.com/products/online-age-checking-provision-and-use-of-online-age-check-services-code-of-practice/standard&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;PAS 1296:2018 Online age
checking. Provision and use of online age check services&amp;nbsp;&lt;/span&gt;Code of Practice&lt;/a&gt; and tech requirements
&lt;a href=&quot;https://www.accscheme.com/media/ppqeviaz/accs-4-2020-technical-requirements-for-age-check-systems.pdf &quot;&gt;ACCS 4:2020&lt;/a&gt;&amp;nbsp;for checks based on that&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://5rightsfoundation.com/static/ieee-2089-2021.pdf&quot;&gt;IEEE Standard for an Age Appropriate Digital Services Framework Based on the 5Rights Principles for Children&lt;/a&gt;, Nov 21&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Added May/June 2024:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;European Commission-commissioned research report Mapping age assurance typologies and requirements&amp;nbsp;&lt;a href=&quot;https://ec.europa.eu/newsroom/dae/redirection/document/104302&quot;&gt;Mapping age assurance typologies and requirements&lt;/a&gt; (&lt;a href=&quot;https://digital-strategy.ec.europa.eu/en/library/research-report-mapping-age-assurance-typologies-and-requirements&quot;&gt;news&lt;/a&gt;, exec summary&lt;a href=&quot;https://op.europa.eu/en/publication-detail/-/publication/4772652e-fdf8-11ee-a251-01aa75ed71a1/language-en&quot;&gt;exec summary&lt;/a&gt;), Apr 24&lt;/li&gt;&lt;li&gt;ICO &lt;a href=&quot;https://ico.org.uk/about-the-ico/what-we-do/information-commissioners-opinions/age-assurance-for-the-children-s-code/&quot;&gt;Age assurance for the Children&#39;s Code&lt;/a&gt;, Jan 24&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/767857059366734162'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/767857059366734162'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2023/08/age-assuranceverification-technologies.html' title='Age assurance/verification technologies &amp; privacy/data protection'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-489048970920226114</id><published>2023-07-23T13:10:00.000+01:00</published><updated>2023-07-23T13:10:12.042+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AI"/><category scheme="http://www.blogger.com/atom/ns#" term="artificial intelligence"/><category scheme="http://www.blogger.com/atom/ns#" term="large language models"/><category scheme="http://www.blogger.com/atom/ns#" term="LLMs"/><category scheme="http://www.blogger.com/atom/ns#" term="machine learning"/><category scheme="http://www.blogger.com/atom/ns#" term="ML"/><category scheme="http://www.blogger.com/atom/ns#" term="models"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Windows: try local LLMs easily</title><content type='html'>&lt;p&gt;&lt;span style=&quot;background-color: white; color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 20px; white-space-collapse: preserve;&quot;&gt;1. Download kobold.cpp.exe from &lt;a href=&quot;https://github.com/LostRuins/koboldcpp/releases&quot;&gt;https://github.com/LostRuins/koboldcpp/releases&lt;/a&gt; (I picked the latest version)&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: white; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(0, 0, 0, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 20px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space-collapse: preserve;&quot;&gt;2. Download the GGML BIN file for the &lt;span class=&quot;ql-hashtag&quot; data-test-ql-hashtag=&quot;true&quot; style=&quot;background: var(--artdeco-reset-base-background-transparent); border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; font-size: var(--artdeco-reset-base-font-size-hundred-percent); font-weight: var(--artdeco-reset-typography-font-weight-bold); margin: var(--artdeco-reset-base-margin-zero); outline: var(--artdeco-reset-base-outline-zero); overflow-wrap: normal; padding: var(--artdeco-reset-base-padding-zero); vertical-align: var(--artdeco-reset-base-vertical-align-baseline);&quot;&gt;model(s)&lt;/span&gt; you want to use - you can get Llama2 models from &lt;a href=&quot;https://huggingface.co/TheBloke/Llama-2-7B-Chat-GGML&quot;&gt;https://huggingface.co/TheBloke/Llama-2-7B-Chat-GGML&lt;/a&gt; - check for which large language models/LLMs are compatible with Kobold, go to the Files tab to find and download the one(s) you want.&lt;/p&gt;&lt;p style=&quot;--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: white; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(0, 0, 0, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 20px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space-collapse: preserve;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: white; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(0, 0, 0, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 20px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space-collapse: preserve;&quot;&gt;3. For command line avoiders, just doubleclick koboldcpp.exe. A command line interface window and GUI window open up&lt;/p&gt;&lt;p style=&quot;--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: white; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(0, 0, 0, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 20px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space-collapse: preserve;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: white; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(0, 0, 0, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 20px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space-collapse: preserve;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgWiASugj39Fs8z4h0XGsqbcndF4ufP4wIAv1b4tPQFWPoReEgPG3yEPD6mB5PCWylyUe2MOhUVpmeI95BXaI_QoJuKA2fHmx_MChXONg22Itg9qzr-g0l78R9FLee9hOduw0FNLvGAAFDyBTaYgSBrRD4ljKzVRhG5f7h_WqFBwzYFC39BTq26x7QBUO8&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;658&quot; data-original-width=&quot;652&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgWiASugj39Fs8z4h0XGsqbcndF4ufP4wIAv1b4tPQFWPoReEgPG3yEPD6mB5PCWylyUe2MOhUVpmeI95BXaI_QoJuKA2fHmx_MChXONg22Itg9qzr-g0l78R9FLee9hOduw0FNLvGAAFDyBTaYgSBrRD4ljKzVRhG5f7h_WqFBwzYFC39BTq26x7QBUO8&quot; width=&quot;238&quot; /&gt;&lt;/a&gt;

&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhD1yrDk4F0v8M9g5LBYlzUrfuzOeYXr2XB6KxsHiyiOYosCsDlXyZZDxzQtcZCCGm8ITUTBy4tWBFqGFZgXZpEsAs1WAxzrTprvapwHCRZZRRlUL0rOB5x5VjkLzNHYb1n4oqiXE3QVFmwdaF2JYgLEHoBmkagZM0B3jI0NHyFVxKX81T_tzvBUc0oRRw&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;185&quot; data-original-width=&quot;609&quot; height=&quot;97&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhD1yrDk4F0v8M9g5LBYlzUrfuzOeYXr2XB6KxsHiyiOYosCsDlXyZZDxzQtcZCCGm8ITUTBy4tWBFqGFZgXZpEsAs1WAxzrTprvapwHCRZZRRlUL0rOB5x5VjkLzNHYb1n4oqiXE3QVFmwdaF2JYgLEHoBmkagZM0B3jI0NHyFVxKX81T_tzvBUc0oRRw&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p style=&quot;--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: white; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(0, 0, 0, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 20px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space-collapse: preserve;&quot;&gt;4. In the GUI window click Model, Browse, select one of the downloaded GGML BIN files then click Launch&lt;/p&gt;&lt;p style=&quot;--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: white; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(0, 0, 0, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 20px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space-collapse: preserve;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: white; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(0, 0, 0, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 20px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space-collapse: preserve;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEip0ctpb0eHwSEej8mj1V4CAjNGIn0Ka1XeGaxn04uo28uTNXSxFUPhq3_7Nhoh2_lUhKslARvr4x8xxxRDkkHAPfyRktZNL_GvBlHMt66lOdd2q4psvfntzEKsWJGKI8myJVmGVxVLvj-epO-YadginmSoHS6KCuFs5BUGdPIP6B1KmCY5MPNRKxnZQMQ&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;658&quot; data-original-width=&quot;652&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEip0ctpb0eHwSEej8mj1V4CAjNGIn0Ka1XeGaxn04uo28uTNXSxFUPhq3_7Nhoh2_lUhKslARvr4x8xxxRDkkHAPfyRktZNL_GvBlHMt66lOdd2q4psvfntzEKsWJGKI8myJVmGVxVLvj-epO-YadginmSoHS6KCuFs5BUGdPIP6B1KmCY5MPNRKxnZQMQ&quot; width=&quot;238&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;5. In your default browser a new tab should open, if not just open a tab yourself and go to http://localhost:5001/ and prompt away!&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEj7deV4hGwxsZt6Fzg_kc1fg5w_2hVONSSlaYkjyKQe24xamAzc3CX0x3yyrtn25r5K7wkZ-oMeYxSRj8tDQvji7SOqnYQ6SF4xVbO8u4rEwJaJXHsOzbgFC3k2ERw2_Gaei4xZ10vcmfc7-0Z8ZUs4jbCdUQDtFhGc-ZmF35CLbu3AAZfwIstemb3yRnY&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;838&quot; data-original-width=&quot;1235&quot; height=&quot;271&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEj7deV4hGwxsZt6Fzg_kc1fg5w_2hVONSSlaYkjyKQe24xamAzc3CX0x3yyrtn25r5K7wkZ-oMeYxSRj8tDQvji7SOqnYQ6SF4xVbO8u4rEwJaJXHsOzbgFC3k2ERw2_Gaei4xZ10vcmfc7-0Z8ZUs4jbCdUQDtFhGc-ZmF35CLbu3AAZfwIstemb3yRnY=w400-h271&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p style=&quot;clear: both; text-align: left;&quot;&gt;6. The command line window stays open, with info on the input prompts, output, processing time etc. Just close it and the browser tab when done. All data stays local to your computer, inputs and outputs etc.&lt;/p&gt;&lt;p style=&quot;clear: both; text-align: left;&quot;&gt;NB. you need a lot of RAM, especially for the bigger models.&lt;/p&gt;&lt;p style=&quot;clear: both; text-align: left;&quot;&gt;Thanks to Autumn Skerritt&#39;s &lt;a href=&quot;https://skerritt.blog/run-your-own-llm&quot;&gt;helpful blog&lt;/a&gt; (which also covers &lt;b&gt;Mac &amp;amp; Linux&lt;/b&gt; and has other useful info) - I just added info on the GUI and other possible downloadable models I found.&lt;/p&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/489048970920226114'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/489048970920226114'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2023/07/windows-try-local-llms-easily.html' title='Windows: try local LLMs easily'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEgWiASugj39Fs8z4h0XGsqbcndF4ufP4wIAv1b4tPQFWPoReEgPG3yEPD6mB5PCWylyUe2MOhUVpmeI95BXaI_QoJuKA2fHmx_MChXONg22Itg9qzr-g0l78R9FLee9hOduw0FNLvGAAFDyBTaYgSBrRD4ljKzVRhG5f7h_WqFBwzYFC39BTq26x7QBUO8=s72-c" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-1877019529113955533</id><published>2023-03-13T15:55:00.003+00:00</published><updated>2023-03-13T15:59:26.314+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="data protection"/><category scheme="http://www.blogger.com/atom/ns#" term="GDPR"/><category scheme="http://www.blogger.com/atom/ns#" term="uk"/><title type='text'>Data Protection &amp; Digital Information (No.2) Bill - key changes from 2022 Bill No.1; GDPR comparisons</title><content type='html'>
  
  &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The UK &lt;a href=&quot;https://bills.parliament.uk/bills/3430/&quot;&gt;Data Protection &amp;amp; Digital Information (No.2) Bill&lt;/a&gt;&#39;s key changes from the &lt;a href=&quot;https://bills.parliament.uk/bills/3322/&quot;&gt;2022 Bill&lt;/a&gt;,&amp;nbsp; compared with the &lt;a href=&quot;https://www.gdprinfo.info/&quot;&gt;EU GDPR&lt;/a&gt;, are summarised in the table below.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;After the table are some &quot;But why didn&#39;t they do that?&quot; questions, and &quot;Will compliance with the EU GDPR really comply with the new Bill&quot;?&lt;/span&gt;&lt;/p&gt;&lt;h3 style=&quot;font-family: arial;&quot;&gt;Table of Key Changes&lt;/h3&gt;&lt;div style=&quot;font-family: arial;&quot;&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Only &lt;u&gt;changes from the 2022 version&lt;/u&gt; are covered, and only those relating to &lt;u&gt;GDPR&lt;/u&gt; (&lt;u&gt;not&lt;/u&gt;&amp;nbsp;law enforcement or intelligence services or the DVS trust framework).&lt;/li&gt;&lt;li&gt;Clarifications/typos/minor corrections and other minor textual changes are &lt;u&gt;not&lt;/u&gt; covered.&lt;/li&gt;&lt;li&gt;The table below is also &lt;u&gt;not&lt;/u&gt; a full comparison of the entire Bill against the EU GDPR.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;
  &lt;p style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;&lt;i&gt;Abbreviations&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
    &lt;table style=&quot;font-family: arial; font-size: 0.8em; width: 100%;&quot;&gt;
  &lt;tbody&gt;&lt;tr&gt;
    &lt;td style=&quot;text-align: center; vertical-align: top;&quot;&gt;&lt;b&gt;ADM&lt;/b&gt;&lt;br /&gt;automated&lt;br /&gt;decision-making&lt;/td&gt;
    &lt;td style=&quot;text-align: center; vertical-align: top;&quot;&gt;&lt;b&gt;C&lt;/b&gt;&lt;br /&gt;controller&lt;/td&gt;
    &lt;td style=&quot;text-align: center; vertical-align: top;&quot;&gt;&lt;b&gt;ICO&lt;/b&gt;&lt;br /&gt;UK Information&lt;br /&gt;Commissioner&#39;s Office&lt;/td&gt;
    &lt;td style=&quot;text-align: center; vertical-align: top;&quot;&gt;&lt;b&gt;P&lt;/b&gt;&lt;br /&gt;processor&lt;/td&gt;
    &lt;td style=&quot;text-align: center; vertical-align: top;&quot;&gt;&lt;b&gt;PD&lt;/b&gt;&lt;br /&gt;personal data&lt;/td&gt;
    &lt;td style=&quot;text-align: center; vertical-align: top;&quot;&gt;&lt;b&gt;S&lt;/b&gt;&lt;br /&gt;UK Secretary of State&lt;/td&gt;
    &lt;td style=&quot;text-align: center; vertical-align: top;&quot;&gt;&lt;b&gt;SRI&lt;/b&gt;&lt;br /&gt;senior responsible individual&lt;/td&gt;
  &lt;/tr&gt;
  &lt;/tbody&gt;&lt;/table&gt;
  &lt;br /&gt;
    &lt;table style=&quot;border-collapse: collapse; border: 1px solid black; font-family: arial; font-size: 0.8em; padding: 5px; width: 100%;&quot;&gt;
  &lt;tbody&gt;&lt;tr&gt;
    &lt;th style=&quot;border-collapse: collapse; border: 1px solid black; width: 10%;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Issue&lt;/span&gt;&lt;/th&gt;
    &lt;th style=&quot;border-collapse: collapse; border: 1px solid black; width: 25%;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Cf 2022 version&lt;/span&gt;&lt;/th&gt;
    &lt;th style=&quot;border-collapse: collapse; border: 1px solid black;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Cf EU GDPR&lt;/span&gt;&lt;/th&gt;
    &lt;th style=&quot;border-collapse: collapse; border: 1px solid black;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Comments/Queries&lt;/span&gt;&lt;/th&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;&lt;span style=&quot;font-family: arial; vertical-align: top;&quot;&gt;Personal data&lt;/span&gt;&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;&lt;span style=&quot;font-family: arial; vertical-align: top;&quot;&gt;Tighter, as this specifically calls out the role of &lt;u&gt;access protection&lt;/u&gt; measures. &lt;br /&gt;It’s PD if C/P knows/ought reasonably to know another person obtains/is likely to obtain info as result of C/P processing and the individual is identifiable/likely to be identifiable by that person at the time of processing, (added) &lt;u&gt;including&lt;/u&gt; if an unauthorised person obtains info due to the C/P &lt;u&gt;not implementing appropriate measures&lt;/u&gt; to mitigate the risk of their &lt;u&gt;obtaining&lt;/u&gt; the info.&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Clarifies: identifiability&amp;nbsp; is assessed at the &lt;u&gt;time of processing&lt;/u&gt; by C/P.&lt;br /&gt;&lt;br /&gt;Focuses on whether info is PD &lt;u&gt;in the hands of&lt;/u&gt; whoever processes it (similar to the position under &lt;a href=&quot;https://www.legislation.gov.uk/ukpga/1998/29/contents&quot;&gt;DPA 1998&lt;/a&gt;).&lt;/span&gt;&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;u&gt;Time of processing&lt;/u&gt; - time of whose processing, processing by C, P, either, the other person?&lt;br /&gt;&lt;br /&gt;If an individual is identifiable to &lt;u&gt;C but not P, or vice versa&lt;/u&gt;, does that make them identifiable to both?&lt;br /&gt;&lt;br /&gt;Why not also mention measures to mitigate the risk of unauthorised persons &lt;u&gt;identifying&lt;/u&gt; individuals (e.g. strong encryption), vs. their obtaining the info? Surely such measures are equally important: focus on either/or, not just “obtaining”?&lt;/span&gt;&lt;/td&gt;
  &lt;/tr&gt;
 &lt;tr&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;Legitimate interests&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;New Art.6(9) gives examples of types of processing that may be necessary for LI: &lt;br /&gt;- Necessary for direct marketing (defined in both versions as &lt;u&gt;communication (by whatever means) of advertising or marketing material which is directed&lt;/u&gt; to particular individuals, and now also to be inserted into Art.4(1)(15A) UK GDPR), &lt;br /&gt;- Intragroup transmission necessary for internal admin, or &lt;br /&gt;- Necessary for security of network and info systems&lt;/span&gt;&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;Much has been made of this. But actually it’s just based on GDPR Recs.&lt;a href=&quot;https://www.gdprinfo.info/#r47&quot;&gt;47&lt;/a&gt; last sentence, &lt;a href=&quot;https://www.gdprinfo.info/#r48&quot;&gt;48&lt;/a&gt; &amp;amp; &lt;a href=&quot;https://www.gdprinfo.info/#r49&quot;&gt;49&lt;/a&gt;, putting them into the operative text.&amp;nbsp;Just without the “strictly necessary”, which in my view is very tight particularly in relation to ensuring security.&lt;br /&gt;&lt;br /&gt;However, &quot;direct marketing&quot; is defined more broadly than in say the European Commission and Council&#39;s approach in the &lt;a href=&quot;https://data.consilium.europa.eu/doc/document/ST-7458-2022-INIT/x/pdf#page=29&quot;&gt;draft ePrivacy Regulation&lt;/a&gt; - could it include &lt;u&gt;targeted advertising&lt;/u&gt; on websites or mobile apps here?&amp;nbsp;&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;Pity that necessity for preventing &lt;u&gt;fraud&lt;/u&gt; &lt;a href=&quot;https://www.gdprinfo.info/#r47&quot;&gt;Rec.47&lt;/a&gt; wasn’t included, or necessity for the &lt;u&gt;security of PD&lt;/u&gt; (not just systems).&lt;br /&gt;&lt;br /&gt;The scope of &quot;direct marketing&quot; would benefit from clarification, e.g. is &quot;sent&quot; intended or is displaying personalised&amp;nbsp;ads on web/mobile enough to be &quot;direct marketing&quot;?&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;Scientific research&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Clarified:&lt;br /&gt;- Even commercial activity can be scientific research&lt;br /&gt;-&amp;nbsp;&lt;/span&gt;But activities only qualify if they can “reasonably described as scientific”&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black;&quot;&gt;GDPR doesn’t define scientific research. The Bill just provides helpful clarifications, e.g. drawing on &lt;a href=&quot;https://www.gdprinfo.info/#r159&quot;&gt;Rec.159&lt;/a&gt; (GDPR doesn’t explicitly exclude commercial research and Art.89 of course requires safeguards there, which the Bill is changing).&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;Processing PD for studies in the area of public health are “scientific” only if conducted in the “public interest” – clarify “public interest” here? But generally that phrase isn’t defined anywhere… and see queries after this table.&lt;/td&gt;
  &lt;/tr&gt;
   &lt;tr&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;Statistical purposes&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;Includes processing for statistical surveys or production of statistical results resulting in aggregate non-personal data, but (added) only if controller doesn’t use personal data processed or resulting information to support measures/ decisions regarding a particular data subject to whom the personal data relates&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;Just clarifications, reflecting &lt;a href=&quot;https://www.gdprinfo.info/#r162&quot;&gt;Rec.162&lt;/a&gt;&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;-&lt;/td&gt;
  &lt;/tr&gt;
  &lt;tr&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;ADM&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;Art.22A(2) no longer states that decisions include profiling.&amp;nbsp; I consider this to now reflect the &lt;u&gt;correct&lt;/u&gt; interpretation, rather than a relaxation - see the next cell. &lt;br /&gt;&lt;br /&gt;Instead, when considering whether there&#39;s meaningful human involvement, the &lt;u&gt;extent to which the decision was reached by profiling&lt;/u&gt; must be considered among other things. That&#39;s one way to interpret the profiling reference in Art.22 and it makes some sense.&lt;br /&gt;&lt;br /&gt;S may make &lt;u&gt;regulations&lt;/u&gt; stipulating that certain cases do, or don&#39;t, have meaningful human involvement.&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;Clarifies the debated issue of whether Art.22 only gives rights to data subjects to object to ADM, or positively prohibits ADM.&lt;br /&gt;&lt;br /&gt;Clarifies that decisions “based solely on automated processing” are those with “&lt;u&gt;no meaningful human involvement&lt;/u&gt;”.&lt;br /&gt;&lt;br /&gt;Clarifies role of &lt;u&gt;profiling&lt;/u&gt;, in the debate on whether Art.22 catches profiling &lt;i&gt;per se&lt;/i&gt;, or &lt;u&gt;only&lt;/u&gt; profiling that leads to ADM (I believe the latter). So, Art.22A(2) now reflects what I feel is the correct interpretation.&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;A positive prohibition usefully clarifies the position.&amp;nbsp;Similarly with the meaning of automated decisions. &lt;br /&gt;&lt;br /&gt;Data subjects aren&#39;t deprived of rights regarding ADM, because the new Art.22C safeguards must enable data subjects to obtain human intervention and to contest decisions, and individuals can no doubt claim compensation for breach of this&amp;nbsp;explicit prohibition.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;However, it&#39;s unclear why Sch.4 will omit &lt;a href=&quot;https://www.legislation.gov.uk/ukpga/2018/12/section/14&quot;&gt;s.14 DPA2018&lt;/a&gt;&amp;nbsp;altogether. Removing the notification requirement may reduce burdens on Cs, but retaining a positive obligation on Cs to &lt;u&gt;consider&lt;/u&gt; requests to reconsider decisions could further help to show that data subjects&amp;nbsp;&lt;u&gt;do &lt;/u&gt;retain their ADM rights. Perhaps S regulations are intended to address this and other ADM-related issues&lt;span style=&quot;font-size: 10.24px;&quot;&gt;?&lt;/span&gt;&lt;br /&gt;&lt;/td&gt;
  &lt;/tr&gt;
    &lt;tr&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;ROPAs (records of processing activities)&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;Needed only for processing which, taking into account its nature, scope, context and purposes, is &lt;u&gt;likely to result in a high risk&lt;/u&gt; to the rights and freedoms of individual - &lt;u&gt;instead of&lt;/u&gt;&amp;nbsp;2022 exemption for &amp;lt;250 employees unless likely to result in high risk&lt;br /&gt;&lt;br /&gt;C records need include only &lt;u&gt;categories&lt;/u&gt; of person with whom C shares PD, rather than named persons. However, there &quot;recipients&quot; has been changed to &quot;&lt;u&gt;persons&lt;/u&gt;&quot; in third countries/ international organisations.&lt;br /&gt;&lt;br /&gt;Amends Art.57(1)(k) to require the ICO to&amp;nbsp;produce and publish a document containing examples of types of processing which it considers are&amp;nbsp;&lt;u&gt;likely to result in a high risk&lt;/u&gt;&amp;nbsp;to the rights and freedoms of individuals (for the purposes of Articles 27A, 30A and 35) - i.e.,&amp;nbsp;&lt;u&gt;senior responsible individual&lt;/u&gt;,&amp;nbsp;&lt;u&gt;ROPAs&lt;/u&gt;&amp;nbsp;and&amp;nbsp;&lt;u&gt;assessment of high-risk processing.&lt;/u&gt;&amp;nbsp;This helps ensure a consistent view of what is considered &quot;high-risk&quot; across these different areas.&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;Required for all Cs and Ps&amp;nbsp;with &lt;u&gt;exemption&lt;/u&gt;&amp;nbsp;for &amp;lt;250 employees unless processing is likely to result in &lt;u&gt;a risk&lt;/u&gt; to rights and freedoms of data subjects, is &lt;u&gt;not occasional&lt;/u&gt;, or the includes &lt;u&gt;special category or criminal-related data.&lt;/u&gt;&lt;br /&gt;&lt;br /&gt;Changing &quot;recipients&quot; to &quot;persons&quot; actually goes&amp;nbsp;&lt;u&gt;broader than GDPR,&lt;/u&gt; as under GDPR &lt;a href=&quot;https://www.gdprinfo.info/#a4.9&quot;&gt;Art.4(9)&lt;/a&gt; certain public authorities (again it&#39;s not entirely clear which) &lt;u&gt;aren&#39;t&lt;/u&gt; considered &quot;recipients&quot;, so this should be positive for UK adequacy as any sharing with public authorities must definitely be recorded.&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Arguably, catching C/Ps even with &amp;lt;250 employees for high-risk processing would catch non-occcasional&amp;nbsp;processing of special category or criminal-related data. &lt;br /&gt;&lt;br /&gt;While it&#39;s &quot;high-risk&quot; vs. &quot;&lt;u&gt;a&lt;/u&gt; risk&quot;, the latter catches most C/Ps; some might it&#39;s say is too strict given realistic risks, especially under EDPB&#39;s&amp;nbsp;&lt;a href=&quot;https://ec.europa.eu/newsroom/article29/redirection/document/51422&quot;&gt;broad interpretation&lt;/a&gt;&amp;nbsp;of &lt;a href=&quot;https://edpb.europa.eu/our-work-tools/our-documents/guidelines/position-paper-derogations-obligation-maintain-records_en&quot;&gt;Art.30.5&lt;/a&gt;&#39;s &quot;or&quot;. So the Bill is less strict than GDPR, but hopefully that&#39;s not significant enough to prejudice UK adequacy.&lt;br /&gt;&lt;br /&gt;It&#39;s odd that the &quot;categories&quot; issue relates to C records (Cs will surely know those they share PD with), rather than DSARs/privacy notices - could the change have been intended for the latter, but inadvertently got inserted here instead?&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;
  &lt;/tr&gt;  
  &lt;tr&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;DPIAs (assessment of high-risk processing)&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;Deleted ICO&#39;s Art.35(4)-(5) obligation to publish list of operations requiring DPIA and power to publish list of operations &lt;u&gt;not&lt;/u&gt; requiring assessment.&lt;br /&gt;&lt;br /&gt;But, see above on the amended Art.57(1)(k) which effectively does the same thing, &lt;u&gt;except&lt;/u&gt;&amp;nbsp;that there&#39;s no longer power to publish lists of operations &lt;u&gt;not&lt;/u&gt;&amp;nbsp;requiring assessment.&lt;/td&gt;&lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;No explicit requirement to consult DPO. However, arguably this is implicit in new Art.27B(2)(c), informing/advising of data protection obligations.&lt;br /&gt;&lt;br /&gt;No&amp;nbsp;&lt;a href=&quot;https://www.gdprinfo.info/#a35.3&quot;&gt;Art.35(3)&lt;/a&gt; criteria deeming certain types of processing always to be high risk (ADM, large-scale processing of special category/criminal-related data and large-scale systematic monitoring of publicly accessible areas!)&lt;br /&gt;&lt;br /&gt;The related &lt;a href=&quot;https://www.gdprinfo.info/#a36&quot;&gt;Art.36&lt;/a&gt;&amp;nbsp;makes &lt;u&gt;prior consultation&lt;/u&gt; with ICO optional, but see &lt;a href=&quot;https://www.linkedin.com/posts/wkhon_gdpr-uk-reform-activity-7039996727331811328-NZRT&quot;&gt;LinkedIn discussion in comments&lt;/a&gt; on whether this makes much difference in practice.&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;The legislative aim to require assessments for high-risk processing remains, in substance. &lt;br /&gt;&lt;br /&gt;I suspect the ICO&#39;s list of high-risk processing will include the Art.35(3) types! In which case, little difference in practice, but more flexibility.&lt;br /&gt;&lt;br /&gt;Oddly, there&#39;s no explicit power for the ICO to publish lists of activities that are &lt;u&gt;not&lt;/u&gt;&amp;nbsp;considered to require assessment as high-risk.&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;Senior responsible individual&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;To be designated by public body or likely high-risk processing, but note the amended Art.57(1)(k) regarding an&amp;nbsp;&lt;u&gt;ICO list &lt;/u&gt;to be published of what&#39;s high-risk processing for this purpose. &lt;br /&gt;&lt;br /&gt;(The ICO&#39;s &quot;high-risk&quot; lists could theoretically be different for SRI, high-risk assessments and ROPA purposes, but they may not be - consistency will be helpful here.)&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;No more&amp;nbsp;&lt;a href=&quot;https://www.gdprinfo.info/#a37.1&quot;&gt;Art.37(1)&lt;/a&gt;(b)-(c)&amp;nbsp;criteria deeming certain types of processing &lt;u&gt;always&lt;/u&gt; to require a DPO (core activities involve large-scale regular and systematic monitoring or processing special category/criminal-related data). &lt;br /&gt;&lt;br /&gt;The individual must be part of the organisation’s &lt;u&gt;senior management&lt;/u&gt;&amp;nbsp;which arguably goes beyond GDPR. Allowing job-sharing here is enlightened. SRI details must be notified to the ICO.&lt;br /&gt;&lt;br /&gt;However, there&#39;s no longer any &quot;sharing&quot; allowed ot the SRI across different public authorities or a related group.&amp;nbsp;&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;Given the SRI must be designated in high-risk processing situations, and issues like resourcing and conflicts are clearly covered, is there much difference in practice?&lt;br /&gt;&lt;br /&gt;Again, I suspect the ICO&#39;s list of high-risk processing here will include the Art.37(1)(a) and (b) types! In which case, again, little difference in practice, but more flexibility.&lt;br /&gt;&lt;br /&gt;No SRI sharing could cause practical problems given the difficulties with recruiting people with data protection expertise!&lt;br /&gt;&lt;br /&gt;&quot;Outsourcing&quot; of SRI functions might perhaps still be possible as the SRI can alternatively &quot;secure&quot; that certain tasks are performed by another, taking into account expertise etc. Probably SRIs without sufficient privacy expertise (yet!) will have to secure another person (which doesn&#39;t seem limited to internal staff) to perform at least some tasks.&lt;/td&gt;
  &lt;/tr&gt;  
    &lt;tr&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;Transfers (data exports)&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;New transitional provisions to &quot;grandfather&quot; valid transfer mechanisms in place before the relevant Bill provisions take effect.&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;Comparing the transfers provisions generally, e.g. &quot;not materially lower&quot; vs &quot;essentially equivalent&quot;, merits a note in itself, and will not be discussed here!&lt;/td&gt;
    &lt;td style=&quot;border-collapse: collapse; border: 1px solid black; vertical-align: top;&quot;&gt;Not discussed here. And it will be up to the European Commission to assess the extent to which these and other changes may affect UK adequacy!&lt;/td&gt;
  &lt;/tr&gt;    
&lt;/tbody&gt;&lt;/table&gt;
  &lt;h3 style=&quot;font-family: arial; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/h3&gt;&lt;h3 style=&quot;font-family: arial; text-align: left;&quot;&gt;But why didn&#39;t they do that?&lt;/h3&gt;&lt;p style=&quot;font-family: arial;&quot;&gt;While the following are points where the 2022 and 2023 versions of the Bill &lt;u&gt;don&#39;t&lt;/u&gt; differ, some queries spring to mind:&lt;/p&gt;&lt;p style=&quot;font-family: arial;&quot;&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;Research processing of special category/criminal-related data&lt;/b&gt; - under &lt;a href=&quot;https://www.legislation.gov.uk/ukpga/2018/12/schedule/1&quot;&gt;DPA2018 Sch.1&lt;/a&gt;&amp;nbsp;para.4,&amp;nbsp;such processing is permitted if it&#39;s necessary for archiving purposes, &lt;u&gt;scientific&lt;/u&gt; or historical research purposes or statistical purposes, is carried out in accordance with Article 89(1) [to be the new Art.84B i.e. safeguards],&amp;nbsp;&lt;u&gt;and&lt;/u&gt; is in the public interest. Here, the UK went &lt;u&gt;beyond&lt;/u&gt; GDPR, because the &quot;public interest&quot; requirement doesn&#39;t appear in &lt;a href=&quot;https://www.gdprinfo.info/#a9.2.j&quot;&gt;Art.9(2)(j)&lt;/a&gt;. National law permitting such processing just has to be &quot;proportionate to the aim pursued, respect the essence of the right to data protection and provide for suitable and specific measures to safeguard the fundamental rights and the interests of the data subject&quot;. Presumably it&#39;s a UK policy decision to require the &quot;public interest&quot; condition in addition? If so, giving examples or defining &quot;public interest&quot; here would be helpful as it&#39;s such a vague and broad term.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;b style=&quot;font-family: arial;&quot;&gt;AI bias and anti-discrimination&amp;nbsp;&lt;/b&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;-&amp;nbsp;the &lt;/span&gt;&lt;a href=&quot;https://www.gov.uk/government/news/new-data-laws-to-boost-british-business-protect-consumers-and-seize-the-benefits-of-brexit&quot; style=&quot;font-family: arial;&quot;&gt;June 2022 consultation response&lt;/a&gt;&lt;span style=&quot;font-family: arial;&quot;&gt; intended to expand the &lt;a href=&quot;https://www.legislation.gov.uk/ukpga/2018/12/schedule/1&quot;&gt;DPA2018 sch.1&lt;/a&gt; para.8 exemption, allowing processing of special category data and criminal offence-related data for equality of opportunity or treatment, to permit bias monitoring, detection and correction in AI systems. Surely this is a laudable aim that no one should object to, so it&#39;s not clear why this update didn&#39;t make it into the Bill?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;PECR/cookies&lt;/b&gt;&lt;/li&gt;&lt;ol style=&quot;font-family: arial;&quot;&gt;&lt;li&gt;&lt;i&gt;Security&lt;/i&gt; - the Bill will allow storage/access to ensure security of the terminal equipment, but why not &lt;u&gt;security of networks/data more broadly&lt;/u&gt;&amp;nbsp;given the critical importance of security generally?&lt;/li&gt;&lt;li&gt;&lt;i&gt;Analytics&lt;/i&gt; - the Bill would allow first party analytics, but it seems not the use of a third party analytics service, as sharing with third parties is allowed only to enable them to &quot;assist with making improvements to the service or website&quot; - why not also to enable them to assist with &lt;u&gt;collecting&lt;/u&gt; that information? SMEs in particular won&#39;t have technical expertise to install their own on-prem inhouse analytics solutions, so not including &quot;or collecting that information&quot; there may undermine the legislative objective of easing web/mobile analytics for organisations.&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;font-family: arial;&quot;&gt;BTW, on DSARs&#39; change from &quot;manifestly unfounded or excessive&quot; to &quot;vexatious or excessive&quot; - the latter phrase has been much discussed (including at regulatory and judicial level), and therefore is well understood in the UK, in the FOI (freedom of information) context. See also the&amp;nbsp;&lt;a href=&quot;https://www.linkedin.com/posts/wkhon_gdpr-uk-reform-activity-7039996727331811328-NZRT&quot;&gt;discussion on this in LinkedIn, in the comments section&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;&lt;p style=&quot;font-family: arial;&quot;&gt;Interestingly, the &lt;a href=&quot;http://web.archive.org/web/20230308003416/https://www.gov.uk/government/news/british-businesses-to-save-billions-under-new-uk-version-of-gdpr&quot;&gt;first version of the press release&lt;/a&gt;&amp;nbsp;said &quot;Ministers have co-designed the Bill with key industry and privacy partners - including Which? and TechUK...&quot; but the &lt;a href=&quot;https://www.gov.uk/government/news/british-businesses-to-save-billions-under-new-uk-version-of-gdpr&quot;&gt;current press release&lt;/a&gt; no longer mentions Which?. Input from consumer organisations is obviously important in this context.&lt;/p&gt;&lt;h3 style=&quot;font-family: arial; text-align: left;&quot;&gt;Will compliance with the EU GDPR really comply with the new Bill?&lt;/h3&gt;&lt;p style=&quot;font-family: arial;&quot;&gt;I spotted one minor example where strictly, it won&#39;t.&lt;/p&gt;&lt;p style=&quot;font-family: arial;&quot;&gt;Privacy notices will have to include info about the right to complain to the controller, under the Bill. GDPR privacy notices needn&#39;t.&lt;/p&gt;&lt;p style=&quot;font-family: arial;&quot;&gt;But, as per statements at the IAPP UK Intensive on 8 Mar 23, it&#39;s very unlikely that the ICO would fine or enforce against Cs lacking that one line (it&#39;ll just say, add that in)! And obviously including that extra info won&#39;t cause any issues under the EU GDPR.&lt;br /&gt;&lt;/p&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/1877019529113955533'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/1877019529113955533'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2023/03/data-protection-digital-information-no2.html' title='Data Protection &amp; Digital Information (No.2) Bill - key changes from 2022 Bill No.1; GDPR comparisons'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-1391674139536012089</id><published>2023-02-24T16:21:00.002+00:00</published><updated>2023-02-24T16:34:04.982+00:00</updated><title type='text'>Key points: EDPB transfers &amp; territorial scope final guidance</title><content type='html'>&lt;p&gt;We now have the final version of the EDPB&#39;s &lt;a href=&quot;https://edpb.europa.eu/our-work-tools/our-documents/guidelines/guidelines-052021-interplay-between-application-article-3_en&quot;&gt;Guidelines 05/2021 on the Interplay between the application of Article 3 and the provisions on international transfers as per Chapter V of the GDPR&lt;/a&gt;&lt;/p&gt;&lt;p&gt;1. Generally, it makes useful clarifications to draft guidance, rather than substantive changes. There are 5 extra examples and new Annex with diagrams for all examples. New Exec Summary. Maria and George remain the same (not Alice or Bob!), but specific third-country names were removed.&lt;/p&gt;&lt;p&gt;2. Most clarifications aren’t surprising e.g. remote viewing/access of/to EEA-hosted personal data from outside EEA whether for support/admin etc. is a “transfer”, including by a processor; EEA platform passing personal data to non-EEA controller is making a “transfer” (“controller” seems a misnomer if the non-EEA entity isn’t subject to GDPR, but the platform is making a transfer whether it is or isn’t)&lt;/p&gt;&lt;p&gt;3. Helpful: controller disclosing personal data to EEA-incorporated processor (with non-EEA parent) – &lt;i&gt;not&lt;/i&gt; a “transfer”. If processor discloses to third-country authority, it does so as &lt;i&gt;independent controller&lt;/i&gt;. So controllers must assess circumstances for sufficient guarantees before engaging such processors.&lt;/p&gt;&lt;p&gt;4. Also helpful:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;when data subjects directly provide personal data to third country controller &lt;i&gt;not&lt;/i&gt; subject to GDPR, that’s &lt;i&gt;not&lt;/i&gt; a transfer&lt;/li&gt;&lt;li&gt;when data subjects directly provide personal data to third country controller that IS subject to GDPR under Art.3(2) offering/monitoring (added: “specifically targets the EU market”), that’s &lt;i&gt;not&lt;/i&gt; a transfer but the controller must comply with GDPR (practical enforceability against it is a different issue of course)&lt;/li&gt;&lt;li&gt;when data subjects directly provide personal data to third country processor for third country controller, they don’t make transfers, but the &lt;i&gt;controller&lt;/i&gt; “transfers” to the processor&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;5. Note: still not a transfer if EEA company employee travels to third country with laptop or remotely accesses EEA-hosted data – it’s within the same entity. New: if the employee in his capacity as such sends or makes available data to another entity in the third country, then that’s a transfer by the company.&lt;/p&gt;&lt;p&gt;6. Non-“transfers”:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;New section on safeguards when&amp;nbsp; processing personal data outside the EEA even if technically there’s no “transfer”. Pay “particular attention” to the third country’s legal framework, as there may still be “increased risks” because “it takes place outside the EU, for example due to conflicting national laws or disproportionate government access in a third country”. These risks must be considered for compliance e.g. Art.5 principles, 24 controller responsibility, 32 security, 35 DPIA, 48 transfers not authorised under EU law: “a controller may very well conclude that extensive security measures are needed – or even that it would not be lawful – to conduct or proceed with a specific processing operation in a third country although there is no transfer situation.”&lt;/li&gt;&lt;li&gt;&lt;i&gt;Privacy notices&lt;/i&gt; for non-transfers outside EEA!: when a controller intends to process personal data outside the EU (although no transfer takes place), this information should as a rule be provided to individuals as part of the controller’s transparency obligations, e.g. to ensure compliance with the principle of transparency and fairness, which also requires controllers to inform individuals of the risks in relation to the processing”. Non-binding, strictly…&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;7. Still unaddressed:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Not a “transfer” if it’s within the same legal entity, so e.g. EEA branch of US corp sending personal data to HQ &lt;i&gt;isn&#39;t &lt;/i&gt;making a transfer, but an EEA subsidiary sending to US parent IS. Obviously the EEA branch would be subject to GDPR, with easy enforceability due to its EEA presence.&lt;/li&gt;&lt;li&gt;Art.3(1) can apply directly to non-EEA “established” entities e.g. in the Costeja case, but EDPB focuses mainly on 3(2), mentioning 3(1) only in relation to processors used by EEA-established controllers. Presumably direct provision of personal data by data subjects to Art.3(1) non-EEA controllers would also not be “transfers”, but the controller is caught by GDPR? (practical enforceability…?)&lt;/li&gt;&lt;li&gt;EEA subprocessor to non-EEA processor – analogy with processor-to-controller transmissions, this must be a “transfer”, but no SCCs exist to allow this… (workaround – adapt P2C SCCs, hey we tried our best!)&amp;nbsp;&lt;/li&gt;&lt;li&gt;The &lt;a href=&quot;https://blog.kuan0.com/2020/07/schrems-ii-data-localization-encryption.html&quot;&gt;“conflicting laws” issue applies equally to EEA-established organizations&lt;/a&gt; that expand to third countries.&amp;nbsp; Remember SWIFT, where using its own US data center was a “transfer”? Presumably now that use alone is not “transfer”, but disclosure to third-country entities would be.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;8. My speculations about possible new options for non-EEA controllers:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;will some non-EEA controllers just directly collect personal data from EEA data subjects now? They may still be subject to GDPR under Art.3(2) or even 3(1), but practical enforceability…&lt;/li&gt;&lt;li&gt;will some non-EEA groups set up non-EEA subsidiaries to operate branches in the EEA, that can send data “back” outside the EEA without making “transfers”? Of course, those subsidiaries are subject to GDPR, and their disclosure to non-EEA parents will be “onward transfers” that need SCCs etc, but that might be easier for some…&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;9. Puzzling: most of us share common views on what “made available” involves, but I didn’t follow “embedding a hard drive or submitting a password to a file” – what does that mean, how do they involve “making available” data?&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/1391674139536012089'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/1391674139536012089'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2023/02/key-points-edpb-transfers-territorial.html' title='Key points: EDPB transfers &amp; territorial scope final guidance'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-1213399944400202695</id><published>2022-10-16T22:02:00.001+01:00</published><updated>2022-10-16T22:02:24.037+01:00</updated><title type='text'>Automated Decision Making (ADM) &amp; GDPR - Flowchart</title><content type='html'>&lt;p&gt;ADM under GDPR - I produced this flowchart after noticing that my Imperial AI MSc students were struggling to parse &lt;a href=&quot;https://www.gdprinfo.info/#a22&quot;&gt;Art.22&lt;/a&gt;. Admittedly it&#39;s been termed the worst-drafted of all GDPR provisions, rightly, by someone I used to work with, who knows who she is :) I hope it will be useful, and as always all comments are welcome!&lt;/p&gt;

&lt;iframe allow=&quot;autoplay&quot; height=&quot;480&quot; src=&quot;https://drive.google.com/file/d/1T0MqH60n3odFSnMW3ss1IVisSusqwsPB/preview&quot; width=&quot;640&quot;&gt;&lt;/iframe&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/1213399944400202695'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/1213399944400202695'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2022/10/automated-decision-making-adm-gdpr.html' title='Automated Decision Making (ADM) &amp; GDPR - Flowchart'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-6417172763264216405</id><published>2022-07-09T17:32:00.011+01:00</published><updated>2022-07-10T12:08:53.173+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="availability"/><category scheme="http://www.blogger.com/atom/ns#" term="business continuity"/><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="GDPR"/><category scheme="http://www.blogger.com/atom/ns#" term="network &amp; information systems security"/><category scheme="http://www.blogger.com/atom/ns#" term="NIS Directive"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="UK NIS Regulations"/><title type='text'>UK NIS Regulations: enforcement, &amp; future</title><content type='html'>&lt;p&gt;For both OESs and DSPs the &lt;a href=&quot;https://www.legislation.gov.uk/uksi/2018/506&quot;&gt;UK NIS Regulations&lt;/a&gt; have barely been enforced, but change is coming,&amp;nbsp; including to bring&amp;nbsp;&lt;b&gt;MSPs &lt;/b&gt;within scope. (&lt;b&gt;OESs&lt;/b&gt; are operators of essential services, basically critical infrastructure service providers, while &lt;b&gt;DSPs&lt;/b&gt; are &quot;digital service providers&quot;: cloud computing service providers, online marketplaces or online search engines&amp;nbsp;&lt;i&gt;only,&lt;/i&gt;&amp;nbsp;&lt;i&gt;not&lt;/i&gt;&amp;nbsp;other providers of digital services in the broad sense).&amp;nbsp;&lt;/p&gt;&lt;p&gt;The &lt;a href=&quot;https://www.gov.uk/government/publications/second-post-implementation-review-of-the-network-and-information-systems-regulations-2018/second-post-implementation-review-of-the-network-and-information-systems-regulations-2018#is-the-existing-form-of-government-regulation-still-the-most-appropriate-approach&quot;&gt;Second Post-Implementation Review of the Network and Information Systems Regulations 2018&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1087719/Second_Post_Implementation_Review_of_the_Network_and_Information_Systems_Regulations_2018.pdf&quot;&gt;PDF&lt;/a&gt;), 4 July 2022, revealed this and other interesting information:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;u&gt;NIS incident reporting&lt;/u&gt; hasn&#39;t actually been happening: “…the system &lt;i&gt;does not appear to be working&lt;/i&gt;. As of this review, &lt;i&gt;competent authorities have received little-to-no reports&lt;/i&gt;, despite other sources of information, such as the Breaches Survey, indicating a prevalence of incidents within the wider economy and society.”&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;u&gt;NIS enforcement&lt;/u&gt;&amp;nbsp;has been minimal;&amp;nbsp;&lt;i&gt;no NIS fines&lt;/i&gt;&amp;nbsp;(penalty notices) have been imposed so far:&amp;nbsp;&lt;/li&gt;&lt;ol&gt;&lt;li&gt;Only &lt;i&gt;2 competent authorities&lt;/i&gt;&amp;nbsp;have enforced to date, &quot;which raises the question of &quot;is the enforcement regime appropriate?&quot; But, “NCSC has also been informed of one very successful instance of a competent authority carrying out enforcement, which had very positive outcomes, suggesting that the enforcement regime may be appropriate.&quot;&amp;nbsp;&lt;/li&gt;&lt;ol&gt;&lt;li&gt;Note: it&#39;s unclear if the UK ICO, which regulates DSPs under the NIS Regulations, was one of thise two authorities.&lt;/li&gt;&lt;/ol&gt;&lt;li&gt;“…there is evidence from competent authorities to suggest that there are cases where enforcement activities were &lt;i&gt;merited &lt;/i&gt;but &lt;i&gt;no action was taken.&amp;nbsp;&lt;/i&gt;The use of enforcement tools overall, is &lt;i&gt;much lower than the reported need&lt;/i&gt; and so far competent authorities appear to have been &lt;i&gt;less inclined to make use of their regulatory powers&lt;/i&gt;.&quot; Why, and why not? The reasons are not stated.&lt;/li&gt;&lt;li&gt;&quot;There is also a reported concern from regulators that the &lt;i&gt;grounds for enforcement&lt;/i&gt; (either via enforcement notices or penalty notices) is &lt;i&gt;not clear enough&lt;/i&gt;”…&lt;/li&gt;&lt;li&gt;“NIS competent authorities... have additionally reported &lt;i&gt;being very restrictive with their regulatory powers&lt;/i&gt;, relying more on regular engagements, inspections, and information notices rather than any binding provisions of the regulations, such as enforcement notices, civil proceedings, or penalty notices.”&lt;/li&gt;&lt;li&gt;&quot;Of those who felt the enforcement regime wasn&#39;t proportionate, 44% gave other reasons including there is no clear link between the fine levied and the actions that operator of essential services took prior to the incident and the fact that fines result in &lt;i&gt;double jeopardy &lt;/i&gt;as there is already a cost relating to a cyber breach.&quot;&lt;/li&gt;&lt;ol&gt;&lt;li&gt;Note: it&#39;s interesting that the double jeopardy cited was not the possibility of fines under both GDPR and NIS, which is the key double jeopardy risk in my view (to be addressed in the EU&#39;s &lt;a href=&quot;https://ec.europa.eu/commission/presscorner/detail/en/ip_22_2985&quot;&gt;NIS 2 Directive&lt;/a&gt;). The breach costs point is, of course, also relevant to GDPR fines too, but cited only sometimes (in conjunction with remediation costs) in GDPR supervisory authority decisions.&lt;/li&gt;&lt;/ol&gt;&lt;li&gt;The only relevant DSPs who indicated the enforcement regime was &lt;i&gt;not&lt;/i&gt; proportionate to the risk of disruption reported feeling that the &lt;i&gt;Regulations were incorrectly applied to DSP organisations&lt;/i&gt; in general. (This I agree with, see later below.)&lt;br /&gt;&lt;/li&gt;&lt;li&gt;DCMS will aim to collect annual data from the competent authorities e.g. the number of incidents per year, the number of independent audits of the Cyber Assessment Framework, the number of improvement plans as a result of the Cyber Assessment Framework, the number of information notices issued by the competent authorities, the number and nature of enforcement notices issued by competent authorities, and the number of organisations regulated by sector and also the number of SMEs regulated by sector.&lt;/li&gt;&lt;br /&gt;&lt;/ol&gt;&lt;li&gt;&lt;u&gt;NIS Regs&#39; Cyber Assessment Framework&lt;/u&gt;: this has allowed experts in competent authorities to review organisations&#39; cyber security arrangements and ensure improvements are made. &lt;i&gt;67 known operators have received improvement plans&lt;/i&gt;&amp;nbsp;(including &lt;i&gt;updating legacy systems and software&lt;/i&gt; to reduce vulnerabilities), highlighting Regulations&#39; role in improving cyber security.&amp;nbsp;&lt;/li&gt;&lt;ol&gt;&lt;li&gt;Note: the reference was only to &quot;operators&quot;. This suggests no DSPs were asked to make any improvements to their cybersecurity under NIS.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;&lt;li&gt;&lt;u&gt;NIS Regs generally&lt;/u&gt;: effective to drive good cyber security behaviours; &quot;...strong indication that without NIS, cyber security improvements across essential services in the UK would proceed at a much slower pace. ...added benefit of covering a large number of sectors, which is expected to address some of the inconsistencies of managing risks to networks and information systems across sectors...&quot;. But, areas of improvement remain, thought to be most appropriately tackled through &lt;i&gt;regulatory intervention&lt;/i&gt;, to strengthen and future-proof the regulatory framework.&lt;/li&gt;&lt;ol&gt;&lt;li&gt;Other regulations or standards mentioned as drivers for improvements in cyber security included: UK General Data Protection Regulations (GDPR) (13 or 86% of relevant digital service providers, 68 or 78% of operators of essential services); ISO27001 (28% of operators of essential services); Cyber Essentials and Cyber Essentials Plus (11% of operators of essential services); as well as other industry standards (33% of operators of essential services).&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;&lt;li&gt;&lt;u&gt;Areas needing improvement, and future plans&lt;/u&gt;: Then-Minister Lopez&#39;s associated&amp;nbsp;&lt;a href=&quot;https://questions-statements.parliament.uk/written-statements/detail/2022-07-04/hcws173&quot;&gt;statement to Parliament&lt;/a&gt;&amp;nbsp;on 4 July noted that recommended changes to the NIS Regs were included in the Department for Digital, Culture, Media &amp;amp; Sport&#39;s Jan 2022 consultation,&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/government/consultations/proposal-for-legislation-to-improve-the-uks-cyber-resilience/proposal-for-legislation-to-improve-the-uks-cyber-resilience#pillar-i-proposals-to-amend-provisions-relating-to-digital-service-providers&quot;&gt;Proposal for legislation to improve the UK’s cyber resilience&lt;/a&gt;&amp;nbsp;(summarised in&amp;nbsp;&lt;a href=&quot;https://www.linkedin.com/posts/wkhon_data-centre-security-activity-6918571534798204928-Pb6e/&quot;&gt;my Linkedin post&lt;/a&gt;).&amp;nbsp;The outcome of that consultation is to be published &quot;later this year&quot;, i.e. &lt;u&gt;later in 2022&lt;/u&gt;. Recent UK political events, including&amp;nbsp;&lt;a href=&quot;https://twitter.com/JuliaLopezMP/status/1544673757725343744&quot;&gt;her resignation on 6 July&lt;/a&gt;, may of course result in delays to the initially-planned timescale. The key areas are:&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;ol&gt;&lt;li&gt;&lt;u&gt;DSP registration and guidance&lt;/u&gt;: 54% of responding DSPs stated it was &lt;i&gt;not easy to identify&lt;/i&gt; that their organisations are in scope (this deters registration, and ICO won&#39;t be aware of their activities to advise them!).&lt;/li&gt;&lt;ol&gt;&lt;li&gt;&quot;Further work is required to ensure that the guidance makes it easy to identify whether firms are in or out of scope of the Regulations and to ensure that organisations that need to be included in the regulations are designated.&quot;&lt;/li&gt;&lt;li&gt;&quot;Registration of digital service providers cannot be left to digital service providers alone... The Government will continue to support the ICO in the work it is already carrying out to identify firms that should be under the Regulations and support them in notifying those organisations of their responsibilities. Both the government and the Information Commissioner, should consider ways to increase awareness of the NIS Regulations with all potential digital service providers.&quot; The government should consider &lt;i&gt;options to provide the Information Commissioner with increased information-seeking powers&lt;/i&gt; (similar to existing ones available to competent authorities of operators of essential services) to ascertain whether an organisation qualifies as a relevant DSP under the NIS Regulations.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;&lt;li&gt;&lt;u&gt;Ensuring the right sectors are caught&lt;/u&gt;: &lt;i&gt;&lt;b&gt;managed service providers (MSPs)&lt;/b&gt;&lt;/i&gt; are &lt;i&gt;not&lt;/i&gt; caught currently, but under the Jan 22 consultation &lt;i&gt;they will be&lt;/i&gt;. (For other subsectors discussed e.g. &lt;i&gt;BPO, SIEM, analytics &amp;amp; AI&lt;/i&gt;, see &lt;a href=&quot;https://www.linkedin.com/posts/wkhon_data-centre-security-activity-6918571534798204928-Pb6e/&quot;&gt;my Linkedin post&lt;/a&gt;, but it seems &quot;While this Post-Implementation Review &lt;i&gt;has not identified any other sectors that need to be included&lt;/i&gt; at this time, it has underlined a need for the government to maintain the &lt;i&gt;powers to make such additions in the future&lt;/i&gt;.&quot;)&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;u&gt;Supply chain security&lt;/u&gt;: OESs can&#39;t monitor supply chains due to &lt;i&gt;lack of supplier cooperation&lt;/i&gt; and &lt;i&gt;lack of resources&lt;/i&gt;. Action is needed to increase operators’ ability to manage security risks arising from supply chains, particularly suppliers &lt;i&gt;critical&lt;/i&gt; to provision of essential services.&lt;/li&gt;&lt;ol&gt;&lt;li&gt;Proposed &lt;i&gt;power to designate critical dependencies&lt;/i&gt;&amp;nbsp;to identify, impose duties, and then &lt;i&gt;regulate certain supply chain organisations&lt;/i&gt; that present systemic risks to OESs, due to their market concentration, reliance on those services, or other factors.&lt;/li&gt;&lt;ol&gt;&lt;li&gt;Comment: could IaaS/PaaS, perhaps even some SaaS providers, be caught both as DSP and as critical dependency? - highest common denominator of compliance required there. Also, could IaaS/PaaS providers that are critical enough, simply be designated as OESs themselves (legislative rules permitting)?&lt;/li&gt;&lt;/ol&gt;&lt;li&gt;DCMS will consider options such as &lt;i&gt;amending guidance&lt;/i&gt; to tackle supply chain security concerns, including using &lt;i&gt;standards and certification&lt;/i&gt;, such as Cyber Essentials and Cyber Essentials +, to address this issue. But cross-government consultation is needed.&lt;/li&gt;&lt;li&gt;Note: see also the&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/government/publications/government-response-on-supply-chain-cyber-security/government-response-to-the-call-for-views-on-supply-chain-cyber-security&quot;&gt;Government response to the call for views on supply chain cyber security&lt;/a&gt;, Nov 2021.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;&lt;li&gt;&lt;u&gt;Capability &amp;amp; capacity of OESs, DSPS, competent authorities&lt;/u&gt;: lack of finance/funding or of general resources, more variable among authorities particularly lack of&amp;nbsp;cyber regulator specific training or centralised NIS training (as opposed to GDPR training). Competent authorities also need more resources for effective enforcement. On authorities&#39; resources:&lt;/li&gt;&lt;ol&gt;&lt;li&gt;DCMS will &quot;commit to persuading those departments to ensure that they &lt;i&gt;meet their legal obligations to fund&lt;/i&gt; their NIS oversight. For these, plus those regulators that are not central government departments, DCMS aims to ensure that competent authorities are able to &lt;i&gt;recover the costs of regulation from those being regulated&lt;/i&gt;, in line with government policy.&quot;&lt;/li&gt;&lt;li&gt;Additional ways to improve resource-efficiency will be considered, e.g. promoting &lt;i&gt;collaboration across authorities and with non-NIS authorities such as banking and financial services regulators&lt;/i&gt; (for designation of critical dependencies), exploring existing frameworks like CBEST and TBEST to test assumptions and highlight areas for further development.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;&lt;li&gt;&lt;u&gt;Incident reporting&lt;/u&gt;: thresholds (in statutory guidance) are too high, and base criteria of a reportable incident is too narrow (disruption to the service, cf. impact on NIS) to capture the most high risk incidents risks.&amp;nbsp;To ensure that the right incidents are captured:&lt;/li&gt;&lt;ol&gt;&lt;li&gt;Authorities should review reporting thresholds and lower if necessary.&lt;/li&gt;&lt;li&gt;OESs and DSPs will be required to report all incidents that have a &lt;i&gt;material impact on the confidentiality, integrity, and availability of NIS &lt;/i&gt;[note: the well known CIA triad], &lt;i&gt;and&lt;/i&gt;&amp;nbsp;[note: I think &quot;or&quot; is intended here?] that have a potential impact on service continuity.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;&lt;li&gt;&lt;u&gt;Enforcement&lt;/u&gt;: DCMS needs to conduct work to assess why the enforcement regime is not being utilised where it is merited.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;u&gt;Consistency and more robust oversight&lt;/u&gt;: greater consistency in regulatory implementation across sectors is required, alongside creation of performance metrics to better measure the impact and effectiveness of the Regulations.&lt;/li&gt;&lt;ol&gt;&lt;li&gt;DCMS should issue &lt;i&gt;revised and updated guidance&lt;/i&gt; to competent authorities, setting out the requirement for a &lt;i&gt;common approach to assessment and performance indicators&lt;/i&gt;;&amp;nbsp;explore ways to make such guidance more binding on authorities; and establish a &lt;i&gt;process by which competent authorities report against performance indicators and are held accountable&lt;/i&gt; for their performance (indicators could be linked to the delivery of the &lt;a href=&quot;https://www.gov.uk/government/publications/national-cyber-strategy-2022/national-cyber-security-strategy-2022&quot;&gt;National Cyber Strategy&lt;/a&gt; and its performance framework).&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;&lt;/ol&gt;&lt;/ol&gt;&lt;div&gt;Note also the related consultation on&amp;nbsp;&lt;a href=&quot;https://www.gov.uk/government/publications/data-storage-and-processing-infrastructure-security-and-resilience-call-for-views/data-storage-and-processing-infrastructure-security-and-resilience-call-for-views&quot;&gt;Data storage and processing infrastructure security and resilience - call for views&lt;/a&gt; (&lt;a href=&quot;https://www.gov.uk/government/news/views-sought-to-boost-the-security-of-uk-data-centres-and-cloud-services&quot;&gt;press release&lt;/a&gt;), including data centre infrastructure, &lt;i&gt;cloud platform&lt;/i&gt; infrastructure and &lt;i&gt;MSP &lt;/i&gt;infrastructure, which expires at the end of &lt;i&gt;Sunday 24 July 2022&lt;/i&gt;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The next UK NIS Regulations review isn&#39;t due for another 5 years.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Comments&lt;/h3&gt;&lt;div&gt;Below are my personal views only, but they&#39;re based on my practical experience of advising clients on the UK NIS Regulations and &lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:32016L1148&quot;&gt;EU NIS Directive&lt;/a&gt;:&amp;nbsp;both their legal and technical/security teams.&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;u&gt;Incident reporting&lt;/u&gt;:&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&quot;There is a lot of uncertainty around the incident response, and &lt;i&gt;which incidents&lt;/i&gt; need to be reported...&quot;. In my view, this uncertainty is a contributing factor, and &lt;i&gt;guidance &lt;/i&gt;is sorely needed, alongside the planned steps mentioned above regarding lowering reporting thresholds and requiring reporting of incidents materially affecting NIS CIA even if not affecting the service.&lt;/li&gt;&lt;li&gt;However, there&#39;s a risk of a tsunami of reports that regulators may not be able to cope with, if &lt;i&gt;every&lt;/i&gt; incident &quot;materially&quot; impacting C, I or A has to be notified. It&#39;s important to bear this factor in mind &lt;i&gt;when setting the reporting test/thresholds&lt;/i&gt;. Again, &lt;i&gt;guidance on &quot;materiality&quot;&lt;/i&gt; will be vital.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;u&gt;&lt;span id=&quot;SaaS&quot;&gt;Awareness, scope, DSPs and non-registration&lt;/span&gt;&lt;/u&gt;: I hope the government will take the opportunity, post-Brexit, to reconsider the scope of the NIS Regulations &lt;i&gt;beyond &lt;/i&gt;just bringing MSPs into scope. In particular, please consider whether and to what extent &lt;i&gt;SaaS providers&lt;/i&gt; should be caught by the NIS Regulations.&lt;/li&gt;&lt;ul&gt;&lt;li&gt;The NIS Regulations were binding from 10 May 2018. Guess what else there was in May 2018? Yep, the GDPR. No surprises then that most organisations focused their resources on GDPR rather than NIS compliance, especially with the huge publicity about GDPR fines and hardly anything being said about NIS.&lt;/li&gt;&lt;li&gt;It&#39;s understandable that IaaS/PaaS providers should be subject to the Regulations as DSPs, because many organisations build their own technology infrastructure or customer-facing services on top of those cloud services. I.e., many organisations create &lt;i&gt;their own SaaS services&lt;/i&gt; based on third party IaaS/PaaS services, which do constitute &lt;i&gt;technology infrastructure-type services&lt;/i&gt;.&lt;/li&gt;&lt;li&gt;However, automatically and unthinkingly copying out the &lt;a href=&quot;https://csrc.nist.gov/publications/detail/sp/800-145/final&quot;&gt;NIST definition of cloud computing&lt;/a&gt;&amp;nbsp;is not the right approach here. Applying NIS laws to SaaS is like applying certain laws to &quot;all websites&quot; when they should actually apply to &quot;website hosting platforms/services&quot;. SaaS involves the provision of &lt;i&gt;specific applications or services&lt;/i&gt; to end users (like a word processing application online, instead of via an application installed on a local computer). Those applications/services can vary hugely in their scope and purpose. The applicability of NIS requirements ought to depend on the &lt;i&gt;specific&amp;nbsp;type&lt;/i&gt; of application/service and its importance to the economy or society (e.g. is the service critical to the provision of an OES&#39;s essential service?) - and not just because of its &lt;i&gt;general&amp;nbsp;nature&lt;/i&gt;&amp;nbsp;as SaaS. Currently, &lt;i&gt;all &lt;/i&gt;SaaS services are technically caught, whether they&#39;re used for bill payments or as a forum for pet lovers to discuss their animals. To me, that doesn&#39;t seem to make sense.&lt;/li&gt;&lt;li&gt;As I&#39;ve previously &lt;a href=&quot;https://web.archive.org/web/20210410195307/https://www.fieldfisher.com/en/services/privacy-security-and-information/privacy-security-and-information-law-blog/offering-cloud-services-online-marketplaces-in-the-uk-nis-representative-registration-and-fines&quot;&gt;pointed out&lt;/a&gt;, SaaS providers don&#39;t always register with the ICO for various reasons.&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Registering puts their heads firmly above the parapet for possible enforcement. Especially as, since Jan 2021, the top £17m tier of fines could be imposed based on serious service outages alone, whereas previously the top tier only applied if the service was important to the economy. If I provided a SaaS service for pet lovers&#39; discussions, which no one could think would harm the economy or society if it went down, I wouldn&#39;t want to register and make my service known to the ICO either.&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://ico.org.uk/for-organisations/the-guide-to-nis/digital-service-providers/&quot;&gt;Saying&lt;/a&gt; that SaaS services are caught &quot;only to the extent that they provide a scalable and elastic pool of resources to the customer&quot; just parrots the definition without providing any useful guidance. &lt;i&gt;All &lt;/i&gt;cloud services are, by definition, meant to be scalable and elastic. They&#39;re not &lt;i&gt;infinitely&lt;/i&gt; scalable or elastic, of course; even IaaS/PaaS services impose practical commercial limits on customers&#39; usage, so SaaS services&#39; lack of infinite scalability/elasticity should be a non-point too. But some SaaS providers do argue they&#39;re not caught because&amp;nbsp;their service doesn&#39;t enable access to a &quot;scalable&quot; and &quot;flexible&quot; pool of shareable computing resources. I have some sympathy here, not because the services really aren&#39;t scalable/flexible, but because (as above), given the legislative objective of NIS laws, I feel that it&#39;s simply not sensible to try to catch all SaaS services just because they&#39;re SaaS, regardless of the exact nature of their services or customers served. Business models are increasingly moving to SaaS, away from software licensing: but there&#39;s no legal requirement to have security measures or report vulnerabilities&amp;nbsp;or security issues affecting all software applications regardless of their nature (although many might think that would be sensible). And I&#39;ve always thought it odd that flexible/scalable services are subject to NIS, when inflexible, non-scalable &quot;classic&quot; hosting platforms are not, even though with the latter their customers are more at risk from availability issues (due to their inflexibility and non-scalability!). Surely it should be the other way round?&lt;/li&gt;&lt;li&gt;And making all SaaS services register is akin to making all software application manufacturers/distributors register their software. The ICO receives fees from controllers who register for data protection purposes, so there&#39;s a benefit to the ICO from that registration. But is the benefit of finding out about all online software applications of whatever type or importance worth the administration and other costs?&lt;/li&gt;&lt;li&gt;Would introducing a fine for non-registration help? I don&#39;t think so, because of the underlying issue I&#39;ve emphasised regarding the inappropriateness and disproportionality of bringing &lt;i&gt;all &lt;/i&gt;SaaS services within scope regardless of their importance to society or the economy (and see later below).&lt;/li&gt;&lt;li&gt;In my experience, SaaS providers may register if they provide important services to operators. Otherwise, they tend to keep their heads down, and I don&#39;t blame them.&lt;/li&gt;&lt;li&gt;The lack of publicly-reported enforcement of the Regulations is another reason for relative lack of awareness of NIS.&amp;nbsp;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;li&gt;&lt;u&gt;Capability and enforcement&lt;/u&gt;:&amp;nbsp;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Certainly as regards DSPs, I&#39;ve found that many ICO staff aren&#39;t familiar with NIS and need NIS training as well as more resources for NIS, e.g. those staffing the helpline number given on the &lt;a href=&quot;https://ico.org.uk/for-organisations/the-guide-to-nis/digital-service-providers/#https://ico.org.uk/for-organisations/the-guide-to-nis/digital-service-providers/#dsp-7&quot;&gt;ICO&#39;s NIS webpage&lt;/a&gt;. As flagged above, some DSPs consider the Regulations were incorrectly applied to DSPs in general, and I agree, possibly because of awareness&amp;nbsp; and/or knowledge issues.&lt;/li&gt;&lt;li&gt;The reluctance of many SaaS providers to register, never mind report incidents, is fuelled by the factors I&#39;ve outlined above, and fear of being subject to the maximum possible fine even though their service may be of minor importance to society or the economy. If they have to bear the costs of ICO investigations too, as is planned, that may drive even more SaaS providers to decide not to register.&amp;nbsp;&lt;/li&gt;&lt;li&gt;The bigger risks for non-registering DSPs are monetary penalties for not reporting incidents when they should have, and/or not having the appropriate security measures in place. If they haven&#39;t registered and haven&#39;t notified incidents, that of course reduces those risks, because the ICO won&#39;t know about them! The main risk then is if they report a personal data breach under GDPR and the ICO says, &quot;Aha! We will fine you under NIS too, because you should have reported the incident under NIS!&quot;. But, this depends on the ICO&#39;s NIS and GDPR enforcement divisions being sufficiently joined up and also trained up (again, the skills/knowledge issue flagged earlier).&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;u&gt;Summary&lt;/u&gt;: personally, I would recommend:&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Reconsidering the &lt;i&gt;extent to which&amp;nbsp;SaaS providers should be in scope&lt;/i&gt; under NIS, if at all.&amp;nbsp; For example, consider introducing specific thresholds or criteria for SaaS providers to be in scope (Obviously if they are critical suppliers to OESs, or OESs themselves, they should be caught under those proposed changes and be exposed to possible designation as OESs, but that&#39;s a separate matter.)&lt;/li&gt;&lt;li&gt;Reconsidering the extent to which&amp;nbsp;SaaS providers&amp;nbsp;should be&amp;nbsp;subject to the different tiers of &lt;i&gt;NIS monetary penalties or other enforcement&lt;/i&gt;, if at all (with the same caveat). Again, consider if different types/tiers of fines or other enforcement should be applicable to SaaS providers or indeed DSPs that aren&#39;t OESs or critical suppliers.&lt;/li&gt;&lt;li&gt;These would help save the ICO&#39;s resources too, so they can be directed towards IaaS/PaaS and truly important SaaS providers.&lt;/li&gt;&lt;li&gt;If less radical changes are to be made, provide &lt;i&gt;much clearer guidance&lt;/i&gt; on if/when SaaS providers will be caught by the Regulations and therefore need to register with the ICO.&lt;/li&gt;&lt;li&gt;&lt;i&gt;Making publicly available&lt;/i&gt; the annual data DCMS aims to collect from regulators, particularly enforcement information and levels of fines imposed. This would help to raise awareness and incentivise compliance.&lt;/li&gt;&lt;li&gt;Requiring the ICO and other regulators to &lt;i&gt;publish the full text of their NIS enforcement and monetary penalty etc notices&lt;/i&gt;, but redacted as necessary (including as to OES/DSP names), ideally also listing and linking to them on a centrally-maintained webpage of NIS enforcement action. That would also help raise awareness and incentivise compliance.&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/6417172763264216405'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/6417172763264216405'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2022/07/uk-nis-regulations-enforcement-future.html' title='UK NIS Regulations: enforcement, &amp; future'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-4905429997640875573</id><published>2022-06-25T11:45:00.010+01:00</published><updated>2022-06-25T11:57:46.413+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="accessibility"/><category scheme="http://www.blogger.com/atom/ns#" term="ageing"/><category scheme="http://www.blogger.com/atom/ns#" term="digital exclusion"/><category scheme="http://www.blogger.com/atom/ns#" term="digital inclusion"/><category scheme="http://www.blogger.com/atom/ns#" term="parody"/><category scheme="http://www.blogger.com/atom/ns#" term="touchscreens"/><category scheme="http://www.blogger.com/atom/ns#" term="usability"/><title type='text'>&quot;Old fingers&quot;: digital exclusion, accessibility</title><content type='html'>&lt;div&gt;Song with serious message: tablets, smartphones &amp;amp; other touchscreens have built-in accessibility &amp;amp; usability issues. This is a real problem as we&#39;ll all get old eventually (&amp;amp; it&#39;s not just the elderly who may suffer from &quot;zombie fingers&quot;): see &lt;a href=&quot;https://www.noisolation.com/research/digital-exclusion-report&quot;&gt;research&lt;/a&gt;; some user&amp;nbsp;&lt;a href=&quot;https://www.consumerreports.org/cro/news/2015/06/zombie-finger-and-touchscreens/index.htm&quot;&gt;solutions&lt;/a&gt;&amp;nbsp;are possible, but designing for lower skin conductivity would be ideal.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The lyrics below are original to me, but I don&#39;t provide any video of them being sung or indeed any backing music, to avoid any copyright issues (despite the parody exception). &lt;a href=&quot;https://www.youtube.com/watch?v=5JG-J1ZTGgw&quot;&gt;This seems to be the official YouTube video&lt;/a&gt;, so James Bond/Shirley Bassey fans please feel free to sing along!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/5JG-J1ZTGgw&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;Old fingers
&lt;br /&gt;Touchscreens weren’t designed for skin that’s dry
&lt;br /&gt;I want to cry!
&lt;br /&gt;Why?! my old fingers
&lt;br /&gt;Can’t control the same touchscreen anymore
&lt;br /&gt;Like once before?
&lt;br /&gt;And I press and I swipe all in vain
&lt;br /&gt;And I curse and I try it again
&lt;br /&gt;But a thousand times, won’t make a difference
&lt;br /&gt;It’s their **** design, conceived for
&lt;br /&gt;Young fingers
&lt;br /&gt;Supple skin, conducting the signals in
&lt;br /&gt;With no chagrin
&lt;br /&gt;You can press, you can swipe all in vain
&lt;br /&gt;You can curse and just try it again
&lt;br /&gt;Try a thousand times, won’t make a difference
&lt;br /&gt;It’s their **** design that beats my
&lt;br /&gt;Old fingers
&lt;br /&gt;Gaming gloves, or wet them, is what I’m told
&lt;br /&gt;Too bad you’re old
&lt;br /&gt;Can’t stop getting old
&lt;br /&gt;Getting old
&lt;br /&gt;We’ll be old
&lt;br /&gt;Who cares ‘bout the old
&lt;br /&gt;You&#39;ll be old
&lt;br /&gt;Just be old!</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/4905429997640875573'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/4905429997640875573'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2022/06/old-fingers-digital-exclusion.html' title='&quot;Old fingers&quot;: digital exclusion, accessibility'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/5JG-J1ZTGgw/default.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-3106633874294319612</id><published>2022-06-17T13:27:00.030+01:00</published><updated>2022-06-20T09:55:46.224+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AI"/><category scheme="http://www.blogger.com/atom/ns#" term="anonymisation"/><category scheme="http://www.blogger.com/atom/ns#" term="cookies"/><category scheme="http://www.blogger.com/atom/ns#" term="data protection"/><category scheme="http://www.blogger.com/atom/ns#" term="DSARs"/><category scheme="http://www.blogger.com/atom/ns#" term="fines"/><category scheme="http://www.blogger.com/atom/ns#" term="GDPR"/><category scheme="http://www.blogger.com/atom/ns#" term="ico"/><category scheme="http://www.blogger.com/atom/ns#" term="law reform"/><category scheme="http://www.blogger.com/atom/ns#" term="machine learning"/><category scheme="http://www.blogger.com/atom/ns#" term="marketing"/><category scheme="http://www.blogger.com/atom/ns#" term="pecr"/><category scheme="http://www.blogger.com/atom/ns#" term="purpose limitation"/><category scheme="http://www.blogger.com/atom/ns#" term="research"/><category scheme="http://www.blogger.com/atom/ns#" term="transfers"/><category scheme="http://www.blogger.com/atom/ns#" term="UK Data Protection Act 2018"/><title type='text'>UK data protection reform post-Brexit: key points summary</title><content type='html'>&lt;p&gt;The UK government’s &lt;a href=&quot;https://www.gov.uk/government/news/new-data-laws-to-boost-british-business-protect-consumers-and-seize-the-benefits-of-brexit&quot;&gt;response to its data protection reform consultation&lt;/a&gt; is out (&lt;a href=&quot;https://www.gov.uk/government/news/new-data-laws-to-boost-british-business-protect-consumers-and-seize-the-benefits-of-brexit&quot;&gt;press release&lt;/a&gt;&amp;nbsp;17 June 2022).&lt;/p&gt;&lt;p&gt;Certain proposals will proceed under the Data Reform Bill announced in the &lt;a href=&quot;https://www.gov.uk/government/speeches/queens-speech-2022&quot;&gt;10 May 2022 Queen’s Speech&lt;/a&gt; (&lt;a href=&quot;https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1074113/Lobby_Pack_10_May_2022.pdf#page=57&quot;&gt;more info&lt;/a&gt;). Others won’t, while still others are to be be considered further. The devil’s always in the detail, of course, so when the Bill’s text is available the proposed changes will be clearer&amp;nbsp;&amp;nbsp;– it&#39;s still unknown exactly when it’s to be published (updated: TechUK &lt;a href=&quot;https://www.techuk.org/resource/plans-to-reform-the-uk-s-data-protection-regime-represent-an-important-evolution-for-the-uk-gdpr.html&quot;&gt;says&lt;/a&gt;&amp;nbsp;the Bill will be laid &quot;&lt;u&gt;this summer&lt;/u&gt; to undergo several rounds of amendments before it is formally passed into legislation&quot;. So, presumably June/July before the August summer holidays).&lt;/p&gt;&lt;p&gt;Some highlights below.&lt;/p&gt;&lt;h4 id=&quot;anon&quot; style=&quot;text-align: left;&quot;&gt;Anonymisation&amp;nbsp;&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;To use&amp;nbsp;&lt;a href=&quot;https://rm.coe.int/convention-108-convention-for-the-protection-of-individuals-with-regar/16808b36f1#page=18&quot;&gt;Convention 108+&lt;/a&gt; test para19: “Data is to be considered as anonymous only as long as it is impossible to re-identify the data subject or if such re-identification would require unreasonable time, effort or resources, taking into consideration the available technology at the time of the processing and technological developments. Data that appears to be anonymous because it is not accompanied by any obvious identifying element may, nevertheless in particular cases (not requiring unreasonable time, effort or resources), permit the identification of an individual. This is the case, for example, where it is possible for the controller or any person to identify the individual through the combination of different types of data, such as physical, physiological, genetic, economic, or social data (combination of data on the age, sex, occupation, geolocation, family status, etc.). Where this is the case, the data may not be considered anonymous and is covered by the provisions of the Convention”.&amp;nbsp;&lt;/li&gt;&lt;li&gt;The test for anonymisation will be &lt;u&gt;relative&lt;/u&gt;, i.e. will the individual remain identifiable &lt;i&gt;by that controller&lt;/i&gt;, cf. a third party?&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;Artificial intelligence (AI) &amp;amp; machine learning (ML), and ADM&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Anti-discrimination - the&amp;nbsp;&lt;a href=&quot;https://www.legislation.gov.uk/ukpga/2018/12/schedule/1#schedule-1-paragraph-8&quot;&gt;UK DPA sch1 para8&lt;/a&gt;&amp;nbsp;exemption allowing processing of &lt;u&gt;special category data and criminal offence-related data&lt;/u&gt; for &lt;u&gt;equality of opportunity or treatment&lt;/u&gt; will be expanded to allow bias monitoring, detection and correction in AI systems.&lt;/li&gt;&lt;li&gt;Fairness - the government will consider the role of UK GDPR “fairness” in wider AI governance in its forthcoming AI White Paper, but will not legislate here.&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.gdprinfo.info/#a22&quot;&gt;Art.22 automated decision-making (ADM)&lt;/a&gt; - will be retained, but with clarified limits &amp;amp; scope, including ADM as a &lt;u&gt;right to specific safeguards&lt;/u&gt;, rather than a general prohibition on solely automated decision-making. The approach to ADM will be aligned with the broader approach to governing AI-powered ADM, which will be addressed as part of the upcoming UK White Paper on AI governance.&lt;/li&gt;&lt;li&gt;Explainability and intelligibility of AI-powered ADM, including the role of DP legislation in that context, will be considered in the White Paper on AI governance.&lt;/li&gt;&lt;li&gt;See also above on purpose limitation.&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 id=&quot;accountability&quot; style=&quot;text-align: left;&quot;&gt;Accountability&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Organisations must have a &lt;u&gt;privacy management programme&lt;/u&gt;.&lt;/li&gt;&lt;li&gt;&lt;u&gt;No&lt;/u&gt; need for DPO, but must designate a suitable individual to oversee&amp;nbsp;data protection compliance&lt;/li&gt;&lt;li&gt;No more data protection impact assessments (DPIAs), or requirement for records of processing activities (ROPAs) as such.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Controllers must have simple, transparent &lt;u&gt;complaint-handling processes&lt;/u&gt; for data subjects (but retaining clear pathway to complain to the ICO).&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;h4&gt;Legal basis - legitimate interests&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;u&gt;No balancing test&lt;/u&gt;&amp;nbsp;will be needed for a limited number of carefully-defined processing activities in the clear public interest based on legitimate interests, likely to include processing activities undertaken by controllers to&amp;nbsp;&lt;u&gt;prevent crime, report safeguarding concerns or that are necessary for other important reasons of public interest&lt;/u&gt;&amp;nbsp;(the government will consider if any additional safeguards are needed for children’s data). Hopefully this should “encourage organisations to make the authorities aware of individuals who are at risk without delay”, including children and other vulnerable groups with protected characteristics. However, core principles like lawfulness, fairness &amp;amp; transparency, and further conditions for processing special category data, etc., would of course continue to apply.&lt;/li&gt;&lt;li&gt;Power to update the list of activities, subject to Parliamentary scrutiny.&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;h4&gt;Special category data, criminal offence-related data&lt;/h4&gt;&lt;p&gt;The&amp;nbsp;&lt;a href=&quot;https://www.legislation.gov.uk/ukpga/2018/12/schedule/1#schedule-1-part-2&quot;&gt;UK DPA 2018 sch1 part 2&lt;/a&gt;&amp;nbsp;exemptions for processing in the&amp;nbsp;&lt;u&gt;substantial public interest&lt;/u&gt;&amp;nbsp;could be expanded to add certain activities, but “substantial public interest” will not be defined specifically.&lt;/p&gt;&lt;h4&gt;Purpose limitation&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Further processing or reuse by&amp;nbsp;the same controller for&amp;nbsp;&lt;u&gt;incompatible purposes will be permitted&amp;nbsp;&lt;/u&gt;“when based on a law that&amp;nbsp;&lt;u&gt;safeguards important public interest&lt;/u&gt;”, with “greater clarification on the rules and permissions of data re-use and the need for greater transparency”.&amp;nbsp;&lt;/li&gt;&lt;li&gt;On&amp;nbsp;&lt;u&gt;consent-based processsing&lt;/u&gt;, “further processing cannot take place when the original legal basis is consent&amp;nbsp;&lt;u&gt;other than in very limited circumstances&lt;/u&gt;”. We’ll have to wait to see what those new circumstances will be.&lt;/li&gt;&lt;li&gt;Distinctions between further processing and&amp;nbsp;&lt;u&gt;new processing by a different controller&lt;/u&gt;&amp;nbsp;to be clarified.&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 id=&quot;transfers&quot;&gt;Transfers&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Adequacy decisions - a risk-based approach will be taken; judicial or administrative redress are both acceptable. There will be ongoing review, cf 4-yr review of adequacy decisions.&lt;/li&gt;&lt;li&gt;The Secretary of State can recognise alternative transfer mechanisms (ATMs).&amp;nbsp;&lt;/li&gt;&lt;li&gt;(But no repetitive derogations or reverse transfers etc.)&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;h4&gt;DSARs&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ol&gt;&lt;li&gt;No nominal fee to be introduced.&lt;/li&gt;&lt;li&gt;No cost ceiling, but controllers can refuse to deal with DSARs that are “&lt;u&gt;vexatious or excessive&lt;/u&gt;” (cf. the current “manifestly unfounded or excessive”).&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;h4&gt;Research&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ol&gt;&lt;li&gt;No new lawful basis for research, but various changes will be made to assist and promote research.&lt;/li&gt;&lt;li&gt;E.g. a “scientific research” definition (hopefully making crystal clear the position on&amp;nbsp;&lt;u&gt;commercial&lt;/u&gt;&amp;nbsp;scientific research, and what&#39;s research in the &quot;public interest&quot;?); and clarifying that&amp;nbsp;&lt;u&gt;broad consent&lt;/u&gt;&amp;nbsp;is possible and can be relied on.&lt;/li&gt;&lt;li&gt;Privacy notices – the UK GDPR&#39;s&amp;nbsp;&lt;a href=&quot;https://www.gdprinfo.info/#a14.5.b&quot;&gt;Article 14(5)(b)&lt;/a&gt;&amp;nbsp;“disproportionate effort” exemption will be replicated, but&amp;nbsp;&lt;u&gt;only&lt;/u&gt;&amp;nbsp;for research purposes, to allow personal data being used for a research purpose differing from the original purpose to be&amp;nbsp;&lt;u&gt;exempt&lt;/u&gt;&amp;nbsp;from re-providing information under&amp;nbsp;&lt;a href=&quot;https://www.gdprinfo.info/#a13.1&quot;&gt;Article 13(3)&lt;/a&gt;&amp;nbsp;- but without exempting controllers who obtain personal data directly from data subjects from providing the required&amp;nbsp;&lt;a href=&quot;https://www.gdprinfo.info/#a13&quot;&gt;Article 13&lt;/a&gt;(1) &amp;amp; (2) information to them on collection. “Disproportionate effort” to be clarified by bringing in the GDPR&#39;s&amp;nbsp;&lt;a href=&quot;https://www.gdprinfo.info/#r62&quot;&gt;Rec.62&lt;/a&gt;&amp;nbsp;language into the operative text.&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;ePrivacy under &lt;a href=&quot;https://www.legislation.gov.uk/uksi/2003/2426/contents&quot;&gt;PECR&lt;/a&gt;&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Fines - to be increased to &lt;u&gt;GDPR levels&lt;/u&gt;.&lt;/li&gt;&lt;li&gt;ICO powers - to include assessment notices etc.&lt;/li&gt;&lt;li&gt;&lt;u&gt;&lt;span id=&quot;cookies&quot;&gt;&lt;/span&gt;Cookies and similar technologies (i.e. mobile apps, smart devices too)&lt;/u&gt;&lt;/li&gt;&lt;ol&gt;&lt;li&gt;&lt;u&gt;Analytics&lt;/u&gt; will be considered “strictly necessary”.&lt;/li&gt;&lt;li&gt;Consent to be unnecessary in more situations: &quot;a small number of other non-intrusive purposes&quot; (e.g. website fault detection?), &quot;where the controller can demonstrate legitimate interest for processing the data&quot;.&lt;/li&gt;&lt;li&gt;Websites must respect users’ browser preferences; the UK will move to &lt;u&gt;no cookies banners &lt;/u&gt;for UK residents and an &lt;u&gt;opt-out model&lt;/u&gt;&amp;nbsp;for cookies once preferences management technology is widely available.&lt;/li&gt;&lt;/ol&gt;&lt;li&gt;&lt;u&gt;Direct marketing&lt;/u&gt;&lt;/li&gt;&lt;ol&gt;&lt;li&gt;&lt;u&gt;Soft opt-i&lt;/u&gt;n to be extended to political parties and non-commercial organisations like NGOs/charities.&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;&lt;li&gt;&lt;u&gt;Nuisance phone calls&lt;/u&gt; e.g. automated telephone marketing&amp;nbsp;&lt;/li&gt;&lt;ol&gt;&lt;li&gt;The ICO will be able to take enforcement action against organisations based on the number of calls &lt;u&gt;generated&lt;/u&gt; (cf. only the number that are connected, currently)&lt;/li&gt;&lt;li&gt;Communications service providers must report to the ICO “suspicious levels of traffic on their networks”.&lt;/li&gt;&lt;/ol&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 id=&quot;transfers&quot; style=&quot;text-align: left;&quot;&gt;ICO&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;New &lt;u&gt;duties&lt;/u&gt; (e.g. to uphold data rights and to encourage trustworthy and responsible data use, have regard to economic growth and innovation, competition issues and public safety, to consult with relevant regulators and any other relevant bodies).&lt;/li&gt;&lt;li&gt;Structural changes e.g. independent Board and Chief Executive.&lt;/li&gt;&lt;li&gt;New powers for the DCMS Secretary of State, e.g. to prepare a statement of strategic priorities which the ICO must respond to; to approve statutory codes of practice and statutory guidance ahead of laying them in Parliament.&lt;/li&gt;&lt;li&gt;Legislative criteria for a more risk-based proportionate approach to &lt;u&gt;complaints&lt;/u&gt; - ICO discretion to decide when/how to investigate complaints, including discretion not to investigate vexatious complaints, and complaints where the complainant has not first attempted to resolve the issue with the relevant data controller. &quot;This will empower the ICO to exercise its discretion with confidence.&quot;&lt;/li&gt;&lt;li&gt;New ICO powers&lt;/li&gt;&lt;ol&gt;&lt;li&gt;To issue &lt;u&gt;technical report notices&lt;/u&gt; where fair and reasonable, having regard to alternative investigatory tools, relevant knowledge and expertise available to the controller or processor and the impact of the cost of producing the report.&lt;/li&gt;&lt;li&gt;To &lt;u&gt;compel witness interviews&lt;/u&gt;, without interfering with the right not to self-incriminate, rights to legal professional privilege and various procedural mechanisms to ensure proportionality &amp;amp; fairness of interview.&lt;/li&gt;&lt;/ol&gt;&lt;li&gt;Must provide organisations with the &lt;u&gt;expected timeline&lt;/u&gt; at the start of all investigations.&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Note: on &lt;u&gt;ICO resources and funding&lt;/u&gt;, the ICO &lt;a href=&quot;https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2022/06/ico-funding-update-fine-income-retention-agreement/&quot;&gt;announced&lt;/a&gt;, on 14 June 2022, its agreement with its sponsor department the Department for Digital, Culture, Media &amp;amp; Sport (DCMS) and with the Treasury (HMT) that the ICO will now able to &lt;u&gt;retain some of the funds paid as a result of its civil monetary penalties i.e. fines&lt;/u&gt;&amp;nbsp;to cover pre-agreed, specific and externally audited litigation costs. (Previously, all fines money went to the UK government’s central Consolidated Fund.)&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/3106633874294319612'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/3106633874294319612'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2022/06/uk-data-protection-reform-post-brexit.html' title='UK data protection reform post-Brexit: key points summary'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-1955794330678593771.post-4450186977183096651</id><published>2022-04-10T15:38:00.003+01:00</published><updated>2022-04-10T16:59:15.831+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="GDPR"/><category scheme="http://www.blogger.com/atom/ns#" term="learning"/><category scheme="http://www.blogger.com/atom/ns#" term="online courses"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="training"/><title type='text'>Security training - review of Security Innovation&#39;s Cmd+Ctrl Shred cyber range &amp; security training</title><content type='html'>&lt;p&gt;GDPR supervisory authorities (SAs) emphasise data protection training (e.g. the UK Information Commissioner&#39;s &lt;a href=&quot;https://ico.org.uk/media/report-a-concern/forms/4019685/report-a-personal-data-breach-form.doc&quot;&gt;personal data breach notification form&lt;/a&gt; asks, &quot;Had the staff member involved in this breach received data protection training in the last two years?&quot;, and &quot;Please describe the data protection training you provide, including an outline of training content and frequency&quot;).&lt;/p&gt;&lt;p&gt;What about security? Security of personal data is of course important under GDPR, and organisations can be fined for not having appropriate security measures in place. While security training for &lt;i&gt;developers &lt;/i&gt;is not specifically mentioned in GDPR as such, developers do also need training on application security issues
that can lead to breaches of websites, online services and any databases or
other data storage behind them (including personal data in systems). Most IT
staff, developers and otherwise, are &lt;i&gt;not&lt;/i&gt; necessarily cyber security (or even security) experts, and
must be educated on what to look for and how to address, at least, the most
common key security issues.&lt;/p&gt;&lt;p style=&quot;text-align: center;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;Many online training courses on cybersecurity
for developers are now available. There are also &quot;cyber ranges&quot; offering
users deliberately vulnerable systems, websites or online applications that
users can attack and seek to exploit, to learn how hackers think and the kinds
of the actions they take, and therefore be able to defend against them better.&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTofh5vqOwJfaUcu8MsofJmrS2VCoqlEyNWES7fuahBWrSYdEfwOLuiF_Z8fCG6XeOG8v77K_aYXtHpP-ZoCtEJYY3BPe1r5-9JNQQ9s_HclJq8e0eDrDL48VH69k5BtJ59s79Cw5_eW2qg7Ekxsfkyw_mqdNCcbFA_PHDDV4pZnf9IwNLoF6s4ZA8/s382/clip_image002.jpg&quot; style=&quot;clear: left; display: inline; float: left; margin-bottom: 1em; margin-right: 1em; padding: 1em 0px; text-align: left;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;382&quot; data-original-width=&quot;230&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTofh5vqOwJfaUcu8MsofJmrS2VCoqlEyNWES7fuahBWrSYdEfwOLuiF_Z8fCG6XeOG8v77K_aYXtHpP-ZoCtEJYY3BPe1r5-9JNQQ9s_HclJq8e0eDrDL48VH69k5BtJ59s79Cw5_eW2qg7Ekxsfkyw_mqdNCcbFA_PHDDV4pZnf9IwNLoF6s4ZA8/s320/clip_image002.jpg&quot; /&gt;&lt;/a&gt;As part of &lt;a href=&quot;https://www.meetup.com/OWASP-London/events/281856079/&quot;&gt;OWASP London CTF
2021&lt;/a&gt;, in Nov 2021 &lt;a href=&quot;https://www.securityinnovation.com/&quot;&gt;Security Innovation&lt;/a&gt; generously offered participants free
access for a month to a fake e-commerce website &quot;Shred Skateboards&quot; on
its &lt;a href=&quot;https://www.securityinnovation.com/training/cmd-ctrl-cyber-range-security-training/cyber-range-suite/&quot;&gt;CMD+Ctrl
CTF (Capture the Flag) web application cyber range&lt;/a&gt;, and for 6 weeks to its Bootcamp
Learning Path, a self-paced online training course incorporating 32 selected courses
from its &lt;a href=&quot;https://www.securityinnovation.com/print-catalog/&quot;&gt;full catalog&lt;/a&gt;
of &lt;a href=&quot;https://www.securityinnovation.com/training/software-application-security-courses/&quot;&gt;training
courses&lt;/a&gt;.&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot;&gt;This blog reviews the Shred range, then
the online training courses. These cover some of the issues referenced in the
recently-finalised European Data Protection Board (EDPB) &lt;a href=&quot;https://edpb.europa.eu/system/files/2022-01/edpb_guidelines_012021_pdbnotification_adopted_en.pdf&quot;&gt;Guidelines
01/2021&lt;/a&gt; on Examples regarding Personal Data Breach Notification, as those
Guidelines include some recommended security measures as well as breach
notification, and also mention OWASP for secure web application development.&amp;nbsp;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Cmd+Ctrl Ranges and Shred&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Cmd+Ctrl&#39;s ranges are generally available
only to paying organisations to train their staff (but not to paying
individuals, sadly. Missed trick there, as I think individuals wanting to
improve their ethical hacking skills would pay a reasonable fee or sub for access).
People who signed up for the event were however given free access to Shred for
a month. Shred is meant to be one of the easy ranges.&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;The Cmd+Ctrl &lt;a href=&quot;https://cmdnctrl.net/welcome&quot;&gt;login page&lt;/a&gt; provides some sensible
disclaimers and warnings:&amp;nbsp;&lt;/p&gt;

&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJxAyOzYEmnI8avAzUfWVqg5e2fQ1DsG8x4MD9DQEZ3mZSpvlvZnO_m1ISq0VUfM4vPubIb6M9IP3qCeHT6jhEDuyUnwDdeKMd6zpXNS7YPPmo9lypnvJhyvsRbK1KbLLLn4Lum5MXdg2q6RZKiSq1zYUTJNmevdxjNKtvO3p8KNamYX92F_pQ1NmW/s440/clip_image004.jpg&quot; style=&quot;display: block; padding: 1em 0px;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;382&quot; data-original-width=&quot;440&quot; height=&quot;348&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJxAyOzYEmnI8avAzUfWVqg5e2fQ1DsG8x4MD9DQEZ3mZSpvlvZnO_m1ISq0VUfM4vPubIb6M9IP3qCeHT6jhEDuyUnwDdeKMd6zpXNS7YPPmo9lypnvJhyvsRbK1KbLLLn4Lum5MXdg2q6RZKiSq1zYUTJNmevdxjNKtvO3p8KNamYX92F_pQ1NmW/w400-h348/clip_image004.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;After logging in, you need to click on the
relevant range&#39;s name and wait a few minutes for it to start up (each user gets
their own virtual machines I suspect on Amazon Web Services), as a real website
available on the Internet with its own URL (hence the exhortation not to enter
sensitive information on the website - I would expand that to real names, real
email addresses and basically any real personal data, because real hackers can
also access that website as much as you can!).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Then, basically explore the website and try
different things to find vulnerabilities e.g. click the links, register user
accounts, try different URLs, enter different things into the search or login
forms, etc. I won&#39;t share screenshots of Shred so as not to give anything away,
but it emulates an online shop for skateboards and related accessories and
pages, with user accounts that can store user details including payment cards,
the ability to purchase gift cards, etc. Each machine is up for I believe 48
hours, and each time you start it, it may have a different URL and IP address. If
things go badly wrong you may have to reset the database (which loses your
changes e.g. a fake user you registered) or even do a full reset, but you&#39;re
not penalised for that, the system retains the record of scores you achieved
for previous exploits.&lt;/span&gt;&amp;nbsp;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;When you successfully exploit a
vulnerability, a banner slides in from the top of the webpage indicating what
challenge was solved and how many points you gained for it. You can also see what
broad types of other challenges remain unsolved.&lt;/span&gt;&amp;nbsp;&lt;/p&gt;

&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;tab-stops: 212.65pt; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbLfQjV8YqojKXvDqxnZ9anCwslXmiEJA_MzO2KSKS66fJvD13hn8WnoCXPrs2fJV1rYQP-MFrvtBje_ngDqjygMjDjddoU5iLc53BOsyOZQHANqYgQQS-2mj6j8bpCjJ5udLSs_GOiZvOWE-ps-8vwpIpiI5U82OsVMEs8EUKVMWR6lrMykK2xrt7/s785/clip_image005.png&quot; style=&quot;display: block; padding: 1em 0px;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;313&quot; data-original-width=&quot;785&quot; height=&quot;256&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbLfQjV8YqojKXvDqxnZ9anCwslXmiEJA_MzO2KSKS66fJvD13hn8WnoCXPrs2fJV1rYQP-MFrvtBje_ngDqjygMjDjddoU5iLc53BOsyOZQHANqYgQQS-2mj6j8bpCjJ5udLSs_GOiZvOWE-ps-8vwpIpiI5U82OsVMEs8EUKVMWR6lrMykK2xrt7/w640-h256/clip_image005.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Via the My Stats link, you can see a Challenges
page, which also gives similar broad information about the types of challenges
remaining unsolved. Unfortunately, only Category information was provided regarding
unsolved challenges (see the Category column of the Solved table shown below
for examples).&amp;nbsp;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIuyUcWUPZlq0z1JP-rmlWxBHMmlhRe4u0U6deXYd1El8tsDLr_f3H3s4KzDPlySf7S6sUa1tlSHJX_N8RRBxg995NP_TyjneuYw6bgUSG9HIGZNQpOe4grOkTL_dnz8KmhyeZL3RKUJrEvLfgt4ikIRLlGNL-t10rQ6veYMVFsK7DYkwYS1qpdKiI/s1274/clip_image007.png&quot; style=&quot;display: inline; padding: 1em 0px; text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;692&quot; data-original-width=&quot;1274&quot; height=&quot;348&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIuyUcWUPZlq0z1JP-rmlWxBHMmlhRe4u0U6deXYd1El8tsDLr_f3H3s4KzDPlySf7S6sUa1tlSHJX_N8RRBxg995NP_TyjneuYw6bgUSG9HIGZNQpOe4grOkTL_dnz8KmhyeZL3RKUJrEvLfgt4ikIRLlGNL-t10rQ6veYMVFsK7DYkwYS1qpdKiI/w640-h348/clip_image007.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;No
detailed information about the exact nature of any challenge (i.e. the info
under the Challenge column, such as &quot;Unsafe File Upload&quot; in the table
above) was provided. It appeared only after you actually solved the challenge, whereupon
it was listed in the Solved table (as well as the banner appearing). The
&quot;Get Hints&quot; link was disabled for this event - but presumably hints
are available in the paid versions of the ranges. However, Security Innovation
provided a live online introduction on the first day of the CTF event, access
to a one-page basic cheat sheet tutorial, with a guide to Burp Proxy for
intercepting HTTP traffic, and weekly emails with some hints and links to
helpful videos. A chat icon at the bottom right of every webpage allowed the
user to ask questions of support staff. I tried to confine my range attempts to
the afternoon/evening given that Cmd+Ctrl is US-based, but I was very impressed
with how quickly responses were given to my chat queries, even though I was
using the range as an unpaid user. The support staff did not give away any
answers, but instead provided some hints, often very cryptic - I suspect similar
to the tips that users for whom the Get Hints&quot; link is enabled would
receive.&amp;nbsp;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Under My Stats there was also a Report Card
link giving detailed information about your performance, also in comparison to
others who had attempted the range, including the maximum score reached.
Challenges were again shown here, broken down by category and percentage
solved.&lt;/span&gt;&amp;nbsp;&lt;/p&gt;

&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAS1mNDt71bhFitYIr_lYSLrnC1PBW72kPvwX5VEY4gcUbphoIIsbH4779It4Ue2ZDtrG4ZLidN9KR94iZAHSmet0qSTdxna8Eg2q2NC98U5hb6EwdMwx1diN3tx6T8lBQ2z_a6aLZJCLqWLSSGrfIXri30n_3HUfJxFKv5gUqCllNkzZ96PJUhs7v/s656/clip_image010.jpg&quot; style=&quot;display: block; padding: 1em 0px;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;472&quot; data-original-width=&quot;656&quot; height=&quot;460&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAS1mNDt71bhFitYIr_lYSLrnC1PBW72kPvwX5VEY4gcUbphoIIsbH4779It4Ue2ZDtrG4ZLidN9KR94iZAHSmet0qSTdxna8Eg2q2NC98U5hb6EwdMwx1diN3tx6T8lBQ2z_a6aLZJCLqWLSSGrfIXri30n_3HUfJxFKv5gUqCllNkzZ96PJUhs7v/w640-h460/clip_image010.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;As well as repeating the solved challenges
table further down on this page, there&#39;s also a time-based view of the user&#39;s stats.
As you&#39;ll see, I had a go over the first weekend, solving a few basic and easy
challenges, then left it until I realised that I would lose access to Shred
soon, so I made a concerted effort over the last few days though I ran out of
energy with an hour or two to spare!&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguInh-c1DepMiQUH6sGXop13_p189DABeFGM7z36oDguGX19HSLR_NNb36KCGi_yEw4VJcraxt6dmtSExHjNvrjvhVyf_rJPEMLU4QssRJzOaw20bt3IYPHLi7UJDbLWH_MiwmA_YZIcZmcQ1OXnJZAzqPF9QwgOvWm49zGPTXwsCzrLd4lMBmRcY5/s543/clip_image011.png&quot; style=&quot;display: block; padding: 1em 0px;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;208&quot; data-original-width=&quot;543&quot; height=&quot;246&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguInh-c1DepMiQUH6sGXop13_p189DABeFGM7z36oDguGX19HSLR_NNb36KCGi_yEw4VJcraxt6dmtSExHjNvrjvhVyf_rJPEMLU4QssRJzOaw20bt3IYPHLi7UJDbLWH_MiwmA_YZIcZmcQ1OXnJZAzqPF9QwgOvWm49zGPTXwsCzrLd4lMBmRcY5/w640-h246/clip_image011.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;I was rather chuffed that, as a mere lawyer
and not cybersecurity professional, I managed to complete 25 out of the 35
challenges and reach the rank of 7, out of 54 people who at least attempted
Shred (in the screenshots below I&#39;ve redacted names and handles other than
common ones like Mark or David). I admit I have attended some pen testing
training, one excellent 2-day course with renowned web security expert &lt;a href=&quot;https://en.wikipedia.org/wiki/Troy_Hunt&quot;&gt;Troy Hunt&lt;/a&gt; (yes, I was very
lucky), and one terrible week-long course with someone whose name should never
be mentioned again (but at least the food was great). However, those courses &lt;a name=&quot;OpenAt&quot;&gt;&lt;/a&gt;were several years ago, and this is the first time that I&#39;ve
attempted a range or CTF event. (I&#39;ve signed up for other services with some similarities,
&lt;a href=&quot;https://hackthebox.eu/&quot;&gt;Hack the Box&lt;/a&gt; and &lt;a href=&quot;https://go.rangeforce.com/community-edition-registration&quot;&gt;RangeForce
Community Edition&lt;/a&gt;, but I haven&#39;t had time to try them properly yet.)&lt;/p&gt;

&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge7-yM8avCEuP7d69138xqx126Gnn-txAFCOS6narDoCJBc9UOxrZXDdr_3zMtzj51ufne-eB3XPAcgiqxe3OaQZVfeFFxGF6ARBB5dSw7rw77ydEcaetPPmH814ELtx2TbuHTwM7KHfyW3dB0EetIOGCiESB9wntGZmNWLB5aJtczdPs6dUqsKsKK/s869/clip_image013.png&quot; style=&quot;display: block; padding: 1em 0px;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;605&quot; data-original-width=&quot;869&quot; height=&quot;446&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge7-yM8avCEuP7d69138xqx126Gnn-txAFCOS6narDoCJBc9UOxrZXDdr_3zMtzj51ufne-eB3XPAcgiqxe3OaQZVfeFFxGF6ARBB5dSw7rw77ydEcaetPPmH814ELtx2TbuHTwM7KHfyW3dB0EetIOGCiESB9wntGZmNWLB5aJtczdPs6dUqsKsKK/w640-h446/clip_image013.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSA5l1khcvdJw3PWjkNhodIOKg1_q855K8OtMDjcHnOfma3U4qfk4vERAjvYZeZwPqXQgiBVBIP7t5wtprB45M9THdyH_3Px-fzuYNLs912BoWZ8ZucGlvk7pCEPGLtLxHr_X61sMoVLl5XLm0Ot1xaE7BFHQw4WLvKjMMC6ofADI72ny_zXc-E79v/s1073/clip_image015.png&quot; style=&quot;display: block; padding: 1em 0px;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;775&quot; data-original-width=&quot;1073&quot; height=&quot;462&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSA5l1khcvdJw3PWjkNhodIOKg1_q855K8OtMDjcHnOfma3U4qfk4vERAjvYZeZwPqXQgiBVBIP7t5wtprB45M9THdyH_3Px-fzuYNLs912BoWZ8ZucGlvk7pCEPGLtLxHr_X61sMoVLl5XLm0Ot1xaE7BFHQw4WLvKjMMC6ofADI72ny_zXc-E79v/w640-h462/clip_image015.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4 style=&quot;text-align: left;&quot;&gt;Prerequisites for trying these ranges&lt;/h4&gt;&lt;p class=&quot;MsoNormal&quot;&gt;You do
need some prior knowledge, particularly about HTML and how URLs, query
parameters and web forms work, HTTP, cookies, databases and SQL etc, and
concepts like base64 encoding and hashes. You also have to know how to use tools
like Chrome developer tools, which is built into Chrome, to edit Shred webpages&#39;
HTML. I&#39;d not used those developer tools before tackling Shred, but searched
for how (I didn&#39;t resort to Burp for Shred, myself). I probably have a better
foundation than most tech lawyers as I have computing science degrees as well
as the pen testing training, coupled with a deep and abiding interest in
computing and security since my childhood days. So I&#39;d strongly recommend that
those without such a foundation should take the courses before attempting any
ranges (the courses are covered in more detail below).&lt;/p&gt;

&lt;h4 style=&quot;text-align: left;&quot;&gt;Positives&lt;/h4&gt;&lt;p class=&quot;MsoNormal&quot;&gt;The range provided an excellent
assortment of different vulnerabilities to try to exploit, most of the type
that exist in real life (indeed, recently I spotted a common one on one site I
shop from, when I mistyped my order number into its order tracking form!). The
chat support staff were very prompt, although I couldn&#39;t figure out some of
their hints.&lt;/p&gt;

&lt;h4 style=&quot;text-align: left;&quot;&gt;Negatives&lt;/h4&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Shred included 3 challenges
(maybe more?) that involved the solving of certain puzzles (at least one of
which scored quite a few points). However, I think the range would have been
better if they had not been included, as you wouldn&#39;t find them on actual websites
- they were simply puzzles to solve, not realistic website vulnerabilities. OK
perhaps for some fun factor, not so much for learning about web
vulnerabilities, particularly as access to the range is time-limited.&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;The biggest negative in my view is that no
model answers are given at the end. If you haven&#39;t managed to solve some of the
challenges, tough luck, they won&#39;t tell you how. A support person said they
felt that these ranges could be devalued by &quot;giving away too much&quot;,
because customers pay to access its ranges. However, I think that view is
misconceived.&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;It depends on how customers use these
ranges internally. I believe they would be best used as hands-on training for tech
staff (developers, security), but I can&#39;t see why previous users would give
away the answers to colleagues or indeed people in other organisations, as it
defeats the object of trying these ranges. If organisations required staff to
achieve a minimum score on these ranges, then yes, that might incentivise
&quot;cheating&quot; and disclosure of solutions. But it&#39;s not uncommon, and in
fact often a good thing, to form teams to solve challenges together and share
knowledge. For this and many other reasons, such a requirement would not make
sense. And it would make no sense for one customer of Security Innovation to
give the answers away to other customers, what would be the purpose of that?&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Conversely, it would be very frustrating
for someone who had paid to use the range to find out that they would not be
told any outstanding answers at the end. If you haven&#39;t managed to teach
yourself the solutions, you don&#39;t know what you don&#39;t know, how will you learn
if they refuse to fill in the gaps? Security Innovation already impose a
condition on the login page that users cannot post public write-ups or answer
guides, which they could expand if they wish (though I don&#39;t think that&#39;s
necessary or desirable).&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;In similar vein, I think they should at
least give hints about the detailed challenges (e.g. &quot;Unsafe file
upload&quot; as one challenge), not just categories of challenges. The cheat
sheet mentioned a few types of vulnerabilities that I spent too many hours trying
to find, and it was only on the last day or two before expiry that I asked on
the chat, only to be told Shred didn&#39;t actually have those types of
vulnerabilities! I appreciate Cmd+Ctrl doesn&#39;t want to give too much away, but
knowing there&#39;s an unsafe file upload issue to try to exploit still doesn&#39;t
tell you &lt;i&gt;how&lt;/i&gt; to exploit it, and it would have saved me so much time
particularly given that access to Shred was time-limited. Again, I think paying
customers would appreciate more detailed hints so that they can be more
targeted and productive in tackling the challenges during the limited time
available (and perhaps &quot;Get hints&quot; would have done that, but access
was disabled for this event).&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Also, I&#39;m not sure how time-limited access
would be for the paid version, but organisations wanting to subscribe should of
course check the details and ensure the time period is sufficient for their
purposes, as staff also have to do their jobs! (I tried the range during my
annual leave).&lt;/p&gt;

&lt;h4 style=&quot;text-align: left;&quot;&gt;Final comments&lt;/h4&gt;&lt;p class=&quot;MsoNormal&quot;&gt;I think it&#39;s definitely worth
it for organisations to pay for their developers to try these ranges, subject
to the negatives mentioned above (and see below for my review of the training
courses). These ranges can be more interesting and fun for users, and certainly
involve more active learning (looking into various issues in context as part of
attempting to exploit those types of vulnerabilities), which research has shown
improves understanding, absorption and retention. And of course, gamification
is known to increase engagement. Attempting these ranges would help to
consolidate knowledge gained during the security training.&amp;nbsp;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;But, as mentioned above, I believe the best
way would be to give staff enough time to tackle the ranges, over a reasonable
period over which the relevant range is open. Don&#39;t make staff do this exercise
during their weekends or leave, or require each person to reach a minimum
score; instead, hold a debrief at the end of the period, for staff to discuss
the exercise and share their thoughts (and hopefully receive the answers to
challenges none of them could solve, so that they can learn what they didn&#39;t
know). I appreciate that leaderboards and rankings can bring out the
competitive streak and make some people try harder, but I believe team members
need to cooperate with each other, and staff shouldn&#39;t be appraised based on
their leaderboard ranking (or be required to reach a minimum score) - the joint
debrief and &quot;howto&quot; at the end is, I feel, the most critical aspect to
getting developer teams to work together better in future to reduce or
hopefully eliminate vulnerabilities in their online applications.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Cmd+Ctrl offers &lt;a href=&quot;https://www.securityinnovation.com/training/cmd-ctrl-cyber-range-security-training/cmd-ctrl-cyber-range-features-benefits/&quot;&gt;a
good variety of ranges&lt;/a&gt; with the stats and other features covered above,
which seem very up to date in their scope: banking (two), HR portal, social
media, mobile/IoT (Android fitness tracker), cryptocurrency exchange, products
marketplace, and cloud. I wish I&#39;d had the chance to try the cloud ones! In
fact, there now seem to be 3 separate cloud-focused ranges: cloud
infrastructure, cloud file storage, and what seems to be a cloud mailing list
management app, i.e. both IaaS and SaaS.&amp;nbsp;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuRiVyNh6iNKsX98K_d-aV5nrE7nYN4-ldX9_6pPzxq-fVrQylF4vFktnGWHxDb1IlLpjx_n92dZeSiaywmcPhxv7VfVaskkMDYrwpZVM0Fn96xzEGlk-qCSPPgs1ZZlE7qEvHBEIa6bZV51-i1_hHFjaSO2-n0FM8Kur_ivcHPb5FJzMUK0qhQWgJ/s915/clip_image017.png&quot; style=&quot;clear: left; display: inline; float: left; margin-bottom: 1em; margin-right: 1em; padding: 1em 0px; text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;510&quot; data-original-width=&quot;915&quot; height=&quot;223&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuRiVyNh6iNKsX98K_d-aV5nrE7nYN4-ldX9_6pPzxq-fVrQylF4vFktnGWHxDb1IlLpjx_n92dZeSiaywmcPhxv7VfVaskkMDYrwpZVM0Fn96xzEGlk-qCSPPgs1ZZlE7qEvHBEIa6bZV51-i1_hHFjaSO2-n0FM8Kur_ivcHPb5FJzMUK0qhQWgJ/w400-h223/clip_image017.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Wishlist&lt;/span&gt;&lt;/h4&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;A range that actually allows the
user to edit the application code to try to address each vulnerability, then
test again for the vulnerability, would be great for developers!&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;h1 style=&quot;text-align: left;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;u&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Online training courses&lt;/span&gt;&lt;/u&gt;&lt;/h3&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Alongside access to Shred, for those who
signed up to the Nov 2021 bootcamp, Security Innovation kindly offered access
for 6 weeks to 32 online courses from its &lt;a href=&quot;https://www.securityinnovation.com/print-catalog/&quot;&gt;full catalog&lt;/a&gt; of &lt;a href=&quot;https://www.securityinnovation.com/training/software-application-security-courses/&quot;&gt;training
courses&lt;/a&gt;. I provide some comments on format and functionality first, then end
with thoughts on the content.&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;I took the bootcamp courses, but the vast
majority of them only after I&#39;d finished the Shred range. The information in
some of those courses would help with the Shred challenges, but not all of
them, and they are aimed at developers, so to follow those courses you would
also still need some prior computing and coding knowledge.&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;It was great that many courses were based
on the &lt;a href=&quot;https://cwe.mitre.org/&quot;&gt;Mitre CWE (common weakness enumeration)&lt;/a&gt;
classifications often used in the security industry, e.g. incorrect
authorization (CWE-863) and on the &lt;a href=&quot;https://owasp.org/www-project-top-ten/2017/Top_10&quot;&gt;OWASP 2017 top 10
security risks&lt;/a&gt;, but I won&#39;t list them all here. The topics covered by the
bootcamp: fundamentals of application security, secure software development,
fundamentals of security testing, testing for execution with unnecessary
privileges, testing for incorrect authorization, broken access control, broken
authentication, database security fundamentals, testing for injection vulnerabilities,
injection and SQL injection, testing for reliance on untrusted inputs in a
security decision, testing for open redirect, security misconfiguration, cross
site scripting (XSS), essential session management security, sensitive data
exposure (e.g. encrypting), deserialization, use of components with known
vulnerabilities, logging and monitoring and XML external entities.&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Several courses were split logically into
one course on the problem, and the next on mitigating it, or testing for it.
Personally, I learn best by being told the point, then seeing practical concrete
worked examples, and I would have liked to see more concrete examples of e.g.
XSS attacks or SQL injection attacks. A couple were given occasionally, but not
enough in my view. (I appreciate some examples can be found by searching
online.)&lt;/span&gt;&amp;nbsp;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgONECyv17qqAXRCXIN1Qlkyg6bRJ6VGC9Zidux42XMK8DVlwlgYa6lBVG8hORiSjuSoKB9Xkp6IJQPnfdlIN_Vg5oX7i8WnIG4llugYItO-lwes1u-NfKsd7eYZADcWTPViSa665mb3zMuQPb15moAfIc6_ZdOrdlFQ_N1Lbgd9uuhCIfsnDvSGKex/s1052/clip_image019.png&quot; style=&quot;display: inline; padding: 1em 0px; text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;676&quot; data-original-width=&quot;1052&quot; height=&quot;412&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgONECyv17qqAXRCXIN1Qlkyg6bRJ6VGC9Zidux42XMK8DVlwlgYa6lBVG8hORiSjuSoKB9Xkp6IJQPnfdlIN_Vg5oX7i8WnIG4llugYItO-lwes1u-NfKsd7eYZADcWTPViSa665mb3zMuQPb15moAfIc6_ZdOrdlFQ_N1Lbgd9uuhCIfsnDvSGKex/w640-h412/clip_image019.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;The above shows Completed but a course&#39;s status
could also be displayed as being in progress. You need to click against a
particular course (where it shows Completed above) to enrol in the first place,
an extra step whose purpose I couldn&#39;t fathom (why not just
&quot;Start&quot;?). The 3 dots &quot;action menu&quot; enables you to copy the
direct link to a particular course for sharing, or pin individual courses.&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Clicking on a course name takes you to a
launch page, from where you can also open a PDF of the text transcription of
the audio.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0hxJw3uhatyOxjlQFb8KaEyAdS4FbZaZ5AQFtAK775YHPnR44Ep2ZvfleVDCuC_AM8z1zgbZNXEDGk-cJI7YtA_Hm8vZ1AE784eOScegC0CuRfuXpdEPhJhtdCLvXBr_-7gvocfg7_BH0oHq_XJehdT67B-5PM8Fygshyt7nTOAB00p_8zyJ-NLOk/s1259/secTrg.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;715&quot; data-original-width=&quot;1259&quot; height=&quot;365&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0hxJw3uhatyOxjlQFb8KaEyAdS4FbZaZ5AQFtAK775YHPnR44Ep2ZvfleVDCuC_AM8z1zgbZNXEDGk-cJI7YtA_Hm8vZ1AE784eOScegC0CuRfuXpdEPhJhtdCLvXBr_-7gvocfg7_BH0oHq_XJehdT67B-5PM8Fygshyt7nTOAB00p_8zyJ-NLOk/w640-h365/secTrg.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;text-align: left;&quot;&gt;You can leave a course part-completed, and
resume later:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;

&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDmObDF9ohZbNVaZ7z7mkpFzD8JGb8135M08f2_dJBzJRiMppidAhrxa13Lh7SYH92B93qJFFyqRbpbDQPcGM-EqBi5ZqSq90TfLR4zJUuIIjLWkrYCh4JPo7isKbLbv4a61AIs4k_Z163MB8LI9SLMhjdH3SABXAJxci3WANH8AR5VvZ3Es2i5B8X/s1038/clip_image023.png&quot; style=&quot;display: block; padding: 1em 0px;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;694&quot; data-original-width=&quot;1038&quot; height=&quot;429&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDmObDF9ohZbNVaZ7z7mkpFzD8JGb8135M08f2_dJBzJRiMppidAhrxa13Lh7SYH92B93qJFFyqRbpbDQPcGM-EqBi5ZqSq90TfLR4zJUuIIjLWkrYCh4JPo7isKbLbv4a61AIs4k_Z163MB8LI9SLMhjdH3SABXAJxci3WANH8AR5VvZ3Es2i5B8X/w640-h429/clip_image023.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;When you launch or resume a course, a video
appears for playing. There are 3 icons on the top right, above the video, for a
glossary (the book), help regarding how to use the video (the questionmark),
and the text version of the course (printer icon).&lt;/span&gt;&amp;nbsp;&lt;/p&gt;

&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Positives&lt;/span&gt;&lt;/h4&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;This course caters for people
with different learning styles, by providing both videos and PDF transcriptions.
Personally, I scan text a zillion times faster than if I had to watch a video linearly at the slower pace at which people speak, so for learning I much prefer text over
video (plus the ability to ask questions, but I didn&#39;t see a chat icon - I
don&#39;t know if that&#39;s possible with the paid version?). So, I always clicked the
printer icon to read the PDF (opens in another tab) rather than watch the
video.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;A TOC button on the bottom right brings up a table of contents on the left, where you can click to go straight to a particular section of the video. That it also shows progress, with a tick against the sections that you&#39;ve watched.&amp;nbsp;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgu7dGXhy8BVTKyjgDsgM_s8OnW-sHLh9Do3C-60jtevQp3bHaY6XB0kEfsAjfR26xQpUOhL61yIDRHXjjxt9WGEYzF_O3v40MMPeSGqSSpplHBHZ_YGFwRa1yl2pNCqqIcIDo1RnudleDrltPTTD-0ENjVbGPDewdatdRUKty6usj8t4yTI2aqbri5/s1195/clip_image027.png&quot; style=&quot;display: block; padding: 1em 0px;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;693&quot; data-original-width=&quot;1195&quot; height=&quot;372&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgu7dGXhy8BVTKyjgDsgM_s8OnW-sHLh9Do3C-60jtevQp3bHaY6XB0kEfsAjfR26xQpUOhL61yIDRHXjjxt9WGEYzF_O3v40MMPeSGqSSpplHBHZ_YGFwRa1yl2pNCqqIcIDo1RnudleDrltPTTD-0ENjVbGPDewdatdRUKty6usj8t4yTI2aqbri5/w640-h372/clip_image027.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;Another positive, from an accessibility perspective: the CC (closed captions) button at the bottom right brings up the text transcript for the current part of the video, synchronised to the audio.&amp;nbsp;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhj5K8sKb6KcgQ23Xuc_S9TF-PZBDBSXb2KVxtUD750Y1TJ-JEFPKc6SrNkJuWWlDGrFVjT4pF8NguZD3qRx65_Gvtd3zAWD6jKc48q4_07U1EcsT6IZ4hj_yMfSPeoEL0l_htEzMIBm6V5A0In15FEmbWPYKUsRXn7JC2unQuNgSG6rstBy7_uEWPp/s1219/clip_image029.jpg&quot; style=&quot;display: block; padding: 1em 0px;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;692&quot; data-original-width=&quot;1219&quot; height=&quot;364&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhj5K8sKb6KcgQ23Xuc_S9TF-PZBDBSXb2KVxtUD750Y1TJ-JEFPKc6SrNkJuWWlDGrFVjT4pF8NguZD3qRx65_Gvtd3zAWD6jKc48q4_07U1EcsT6IZ4hj_yMfSPeoEL0l_htEzMIBm6V5A0In15FEmbWPYKUsRXn7JC2unQuNgSG6rstBy7_uEWPp/w640-h364/clip_image029.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;

&lt;h4 style=&quot;text-align: left;&quot;&gt;Negatives&lt;/h4&gt;&lt;p class=&quot;MsoNormal&quot;&gt;The PDF didn&#39;t always show all
the slides from the video, especially in the first few courses - not all the
slides contained substantive content, but some slides with example URLs or code
were missing from the PDF version. So, personally, I only played the videos to
check for any useful slides missing from the PDFs.&amp;nbsp;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfnDhrJddp6fNu0m-BCQziYQvbepZV8JpxEC-MWttQRHm2yGN6Z8ygkiRIQS2pXsp_CteTFrWrqpS1sHhNyWE1BvrL5TY4_5KZjXvPsmPAd21l4Zu7eubC0ZAO12rSCfgABWHqpM_R3b5VdJYDuRKzKZJJKjzgpUG-qsgl2CA_pP8KkN1b0Sax5551/s1175/clip_image025.png&quot; style=&quot;display: inline; padding: 1em 0px; text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;693&quot; data-original-width=&quot;1175&quot; height=&quot;378&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfnDhrJddp6fNu0m-BCQziYQvbepZV8JpxEC-MWttQRHm2yGN6Z8ygkiRIQS2pXsp_CteTFrWrqpS1sHhNyWE1BvrL5TY4_5KZjXvPsmPAd21l4Zu7eubC0ZAO12rSCfgABWHqpM_R3b5VdJYDuRKzKZJJKjzgpUG-qsgl2CA_pP8KkN1b0Sax5551/w640-h378/clip_image025.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;If you play a video, it stops occasionally
and you have to click the play button again to start the next section, which
may not be obvious. Sometimes it stops to provide interactivity, i.e. the user
has to click on one part of the slide to learn about that issue, click on
another part to learn about another issue etc. I hate these types of features,
myself. I would prefer videos to just play continuously, moving on from section
and part to section and part, unless and until the user pauses it. Stopping a
video to force the user to click on something just to get to the next portion
seems popular, particularly with the periodic online staff training that many
are compelled to undergo for regulatory compliance reasons, but really it&#39;s not
the same as active learning, in my view! Forced stops like these just break the
train of thought and get in the way, when the user wants to get a move on. But
perhaps this is a matter of personal preference, so allow me my rant about
&quot;interactive&quot; online training courses!&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;Exam&lt;/h4&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;At the end of a video, you can take an exam
(and there are also Knowledge Check quizzes to answer throughout the video). As
I had scanned the PDFs rather than watch the videos, I generally went straight
to the exam via the TOC or by dragging the position arrow.&lt;/span&gt;&amp;nbsp;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;If you pass an exam, you get a certificate of
completion that you can download under the Transcripts section of the site,
which also allows printing of the list of courses and marks (niggle: all
certificate PDFs had the same filename, it would be great if certificate
filenames followed the course name, and if you could download a single zipped
file of all certificates in one go).&lt;/span&gt;&amp;nbsp;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;You&#39;re allowed to take the exam multiple
times until you pass. Most exams comprise about 4-5 questions, although one had
3, a few 6-8, and another 12 questions. They estimate it takes about 5 mins per
exam (10 mins sometimes), which I found was about right.&lt;/span&gt;&amp;nbsp;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;It doesn&#39;t seem possible to go back and
amend your answer if you change your mind about a previous question - when I
tried that to do that in one exam, it threw a fit and I ended up having to
retake the exam (with the same answers) twice before it would register as
completed.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&amp;nbsp;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj70eUsPGqMYl6ss3O0c3RmiVjTLppbi5v_E1eEZIsZ1YQ_WsO94HqNNU3Fui46oiDDzEqcRfQpZ73XXNwmQiSpZekAGRPpe_wQnbBsdmWoN3Q4XRwvZh744DXDLn0YdDss5EzY6Zi2TDbTWqBBuDdn80_tFRrnKm1wJl-ATWH-7B41pBAo-S61ISp/s1347/clip_image031.png&quot; style=&quot;display: inline; padding: 1em 0px; text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;811&quot; data-original-width=&quot;1347&quot; height=&quot;386&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj70eUsPGqMYl6ss3O0c3RmiVjTLppbi5v_E1eEZIsZ1YQ_WsO94HqNNU3Fui46oiDDzEqcRfQpZ73XXNwmQiSpZekAGRPpe_wQnbBsdmWoN3Q4XRwvZh744DXDLn0YdDss5EzY6Zi2TDbTWqBBuDdn80_tFRrnKm1wJl-ATWH-7B41pBAo-S61ISp/w640-h386/clip_image031.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;At the end of the exam, your full results
are shown (it doesn&#39;t show results per question as you go through):&lt;/p&gt;

&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhk5kqOZHfbRK9Pu6jzPJZTLT4AvjTDqahw7j62xYjebjlXymwc2ebQYqUFFvr-oXDSKTi-ZHYclNJ0W-8JpK47SKShmPodE60pXg-3Pjw5otmeFj5r0KaBfKOk451xqK8qjQ3ybuFDV7K26VV8sPFvvNwA2ERADCXe0aLvY5Hbqcc3L4O1Xab7LvS1/s1035/clip_image033.png&quot; style=&quot;display: block; padding: 1em 0px;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;595&quot; data-original-width=&quot;1035&quot; height=&quot;230&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhk5kqOZHfbRK9Pu6jzPJZTLT4AvjTDqahw7j62xYjebjlXymwc2ebQYqUFFvr-oXDSKTi-ZHYclNJ0W-8JpK47SKShmPodE60pXg-3Pjw5otmeFj5r0KaBfKOk451xqK8qjQ3ybuFDV7K26VV8sPFvvNwA2ERADCXe0aLvY5Hbqcc3L4O1Xab7LvS1/w400-h230/clip_image033.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4 style=&quot;text-align: left;&quot;&gt;Tips&lt;/h4&gt;&lt;p class=&quot;MsoNormal&quot;&gt;The obvious answer is usually the
right one, and if you think &quot;Yes, but only if..&quot;, then the answer is
probably &quot;No&quot;! I felt a few of the questions or multiple choice
answers were unclearly or ambiguously phrased. I did think some of the answers
were more about categorising vulnerabilities by type, e.g. broken
authentication, or more about vulnerabilities than about how to mitigate them.&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;If you didn&#39;t pass, you can click Review
Exam to see where you went wrong, which is helpful. I only had to retake one to
pass (becase of the No answer above when I had answered Yes!), but didn&#39;t
bother to retake a few others where I&#39;d passed with less than 100%.&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;I discovered that I actually knew more than
I thought I did, so the courses didn&#39;t actually help me with Shred (although
the support staff tips did). But I still learned some useful things that I
didn&#39;t already know, and I strongly recommend that those without the necessary foundation
should take these courses before trying the ranges.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Final thoughts&lt;/h3&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Overall, I would recommend the Cmd+Ctrl
ranges as an excellent way for developers and security staff to learn about
online application vulnerabilities, subject to taking the courses first for those
without the prior knowledge. They really are aimed at developers/programmers,
so most lawyers may struggle, even tech lawyers. I do think it&#39;s helpful for
lawyers to have a basic knowledge of the common vulnerabilities and how they
are exploited and mitigated when discussing cybersecurity measures and breaches
with clients that have suffered incidents, but you probably don&#39;t need to
tackle the courses or ranges to gain that knowledge.&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot;&gt;Thanks very much again to &lt;a href=&quot;https://www.securityinnovation.com/&quot;&gt;SecurityInnovation&lt;/a&gt; for making Shred and the courses available for the OWASP London CTF
2021 event!&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;(I wrote this back in Dec 2021 but for various reasons couldn&#39;t publish it till now.)&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/4450186977183096651'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1955794330678593771/posts/default/4450186977183096651'/><link rel='alternate' type='text/html' href='http://blog.kuan0.com/2022/04/security-training-review-of-security.html' title='Security training - review of Security Innovation&#39;s Cmd+Ctrl Shred cyber range &amp; security training'/><author><name>Kuan</name><uri>http://www.blogger.com/profile/00041429221345800464</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTofh5vqOwJfaUcu8MsofJmrS2VCoqlEyNWES7fuahBWrSYdEfwOLuiF_Z8fCG6XeOG8v77K_aYXtHpP-ZoCtEJYY3BPe1r5-9JNQQ9s_HclJq8e0eDrDL48VH69k5BtJ59s79Cw5_eW2qg7Ekxsfkyw_mqdNCcbFA_PHDDV4pZnf9IwNLoF6s4ZA8/s72-c/clip_image002.jpg" height="72" width="72"/></entry></feed>