Are there any ethical concerns you have about implementing AI/ML?

1.3k views1 Upvote5 Comments
Sort By:
Oldest
CISO in Software4 years ago
I'm in healthcare, and what we're trying to do is develop drugs. Right now it's like a 10 year cycle, so we're trying to find a way to speed that up. There's a lot of ethics involved in AI/ML on what you can access when you're swallowing sensors. What kind of data can you pull? Is it going to be PHI? Is it going to be HIPAA data? Things like that. What kind of data do you want to release to your doctor, if you're all sensitized, because pretty soon we're going to be poking sensors all over our bodies that do a great number of things. So that's where we have to be careful.
Head of Information and Data Analytics in Software4 years ago
When you talk about security, privacy becomes important. For example, when you're doing this whole insider threat part, you're actually profiling your employees. Now, how far do you want to go? When you profile, it's a very, very thin line. There has to be controls in place for who sees employees’  behavior versus who doesn't.  Do you want to get your privacy lawyers involved? Another example is with Target, the case around predictive analytics and sending coupons to a girl who was pregnant.   And take the self driving car example. How are you going to optimize for hitting a wall versus a human? Who would manage that? What are the implications from an insurance perspective? How are you going to plan for that? I think it's still early. We're still getting there, but those are the areas we'll be spending more and more time on.
1 Reply
Sr Director of Information Security and Compliance4 years ago

There's not a day, an hour, in security that goes by where we don't think about privacy. Security has become privacy. It's not only “do I have to be careful with who sees what,” when it comes to employee data, I’m actually beingvery conscientious about what we're gathering from the employees to begin with in the first place. I'll give you a perfect example of how that came about.  Recently we were looking at some MDM tools for our phones. I ended up going with an MDM tool that did more sandboxing, but collected less data because I had to find that balance. I want my employees to trust me.I know it's their phone, and I know they want to be able to do some things. So where can I draw the line where these guys will feel comfortable using their phone and I still feel like I've got the protections in place that I need from a corporate perspective without violating their privacy. I'm not seeing what's on their pictures. I don't need to see their GPS locations. I had to find a solution where I didn't really need that stuff to protect the data. It was more of a privacy exercise, then it was a security exercise.

lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
Sr Director of Information Security and Compliance4 years ago
Forescout has employees all over the world. There are GDPR rules, Canadian rules, etc.. People are in all sorts of different jurisdictions.  Somebody in Amsterdam versus somebody in Germany has different requirements and different rules. How do you make that work for a corporation? You've got to make some tradeoffs in privacy, and sometimes you make tradeoffs in security.  Finding that balance is really tough. When I launched the program that needed access to employees’ phones, I said, we better go talk to our employees. We also talked to the lawyers in the different locations and explained what we wanted to do. The initial thought and the initial plan that we had actually got scrapped. There were too many complaints from our employees, things like... that's too much of a privacy violation or you're getting too much data from my phones. They also lost some things. For  example: they cannot copy and paste anything inside of our sandbox outside the sandbox. In the beginning, you couldn't take something that was an address and copy it into maps because I can't tell that it's a maps program. I can't tell that it's an address, because I took that trade off and said, “I'm not going to look at what you're looking at or copying, but I'm just not going to allow you to do it even if it was totally legit.”
1
Vice President of Information and Security in Manufacturing4 years ago
It's a fin line between invasion of privacy and securing your enterprise. You want to ensure you are capturing risk-based traffic and anomalies to protect the company, but at the same time your poking into personal lives.
1

Content you might like

TCO19%

Pricing26%

Integrations21%

Alignment with Cloud Provider7%

Security10%

Alignment with Existing IT Skills4%

Product / Feature Set7%

Vendor Relationship / Reputation

Other (comment)

View Results
5.7k views3 Upvotes1 Comment
IT Manager in Constructiona month ago
Hello,
the topic is so broad, what are you focused on?
Read More Comments
4.8k views2 Upvotes5 Comments

No Increase16%

1-5% increase47%

6-25% increase24%

26-50% increase6%

51-75% increase1%

76%+1%

Other2%

View Results
1.7k views1 Upvote