Artificial Intelligence Steps Into The Boardroom

Last week, the GC100, the association of General Counsel and Company Secretaries working in FTSE 100 companies, published the results of a poll of their members on the topic of the use of AI at Board and Committee levels.

Specifically, the article looked at what might be considered one of the ‘lower risk’ utilisations of AI in the Boardroom: Board Packs and minute-taking.

Although the sample size was small (109 respondents, with not all respondents answering every question), the responses illustrate a growing appetite among GCs and CoSecs to introduce AI, at least in these limited circumstances, provided concerns around confidentiality and information security can be responsibly addressed.
 
Of those that answered, 92% of respondents have not introduced AI to assist with minute-taking in their organization. The same number do not currently use third-party supplied AI technology to assist with the preparation of board packs. However, 37% were in favour of the use of AI in the Boardroom (with 27% undecided).

Of the 36% against such use, and in fact also among advocates of its use, particular concerns cited were that while AI may drive efficiency, concerns remained about: risk of error (e.g., AI missing nuance or misunderstanding what had been said); confidentiality and loss of privilege in legal advice contained in packs/minutes; the discoverability of the information recorded by AI; and a lack of transparency in the process by which AI determined what should go into the minutes (i.e., how did AI exercise judgment on content). One respondent noted that their directors have expressed concerns about the verbatim recording of confidential and sensitive conversations; “Minutes are not and should not be verbatim records of meetings," noted another.
 
Partially addressing those concerns, early adopters point out that minutes and transcripts produced by AI are typically reviewed by the CoSec (or team member).

At present, that appears to be an absolutely essential element of quality control. Provided confidentiality, privilege, and information security concerns can be addressed, AI has the power to be a tool to do some of the legwork, for example, putting all Board/committee packs into standardized formatting and presentation style; sense-checking for grammatical errors; assisting with the addition of analytical graphics; or even suggesting improvements in the presentation of information.

But whether used for preparing Board packs or for producing a first draft of minutes, there seems to be agreement that human input is an essential element before finalisation.
 
The reservations expressed are to be expected, but do not seem insurmountable (as is evident from the 8% who have already embraced AI in some way). There are AI tools where information can be ‘sequestered’ to address concerns about confidentiality and other sensitivities. Likewise, to the apparent concerns of certain respondents that Directors and Committee attendees would not want there to be verbatim records, AI does not necessarily need to ‘take a verbatim recording’ in order to produce a summarized output.

However, needing to address these and other issues is illustrative of a factor which is evidently one of the blockers to faster adoption of AI by Boards and their committees: it won’t happen until the majority of those sat in the room are happy they understand what it’s doing and how these apparent risks are being mitigated.

Lloyd Nail is Senior Associate and Tom Whittaker is Director, at UK law firm Burges Salmon 

Image: Vlada Karpovich

You Might Also Read: 

Data Centres Given Critical National Infrastructure Status In Britain:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« US Citizen Jailed For Cyber Espionage
Britain's Cyber Risk Is “Widely Underestimated”  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

PubNub

PubNub

PubNub enables developers to build secure realtime Mobile, Web, and IoT Apps.

Global Station for Big Data & Cybersecurity (GSB)

Global Station for Big Data & Cybersecurity (GSB)

GSB is an interdisciplinary research hub to cover big data, information networks, and cybersecurity.

Identillect Technologies

Identillect Technologies

Identillect Technologies provide a user-friendly secure email solution to protect critical information, with an emphasis on simplicity.

Immersive Labs

Immersive Labs

Immersive Labs have created a kinesthetic learning platform which identifies gaps in your teams cyber skills.

TechVets

TechVets

TechVets is a non-for-profit helping UK veterans and service leavers retrain into Cyber Security and Technology jobs.

Me Learning

Me Learning

Me Learning provides engaging, informative and clearly explained learning materials for complex and challenging professional environments in areas including GDPR and Information Governance.

Corsa Security

Corsa Security

Corsa Security is leading the transformation of network security with a private cloud approach that helps scale network security services with unwavering performance and flexibility.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

DivvyCloud

DivvyCloud

DivvyCloud protects your cloud and container environments from misconfigurations, policy violations, threats, and IAM challenges.

Voodoo Security

Voodoo Security

Voodoo Security is a specialized information security consulting firm focused on security assessments, risk and compliance analysis, and cloud security.

Cyturus Technologies

Cyturus Technologies

Cyturus Technologies delivers cybersecurity business risk quantification services using our proprietary Adaptive Risk Model (ARM).

GAVS Technologies

GAVS Technologies

GAVS is a global IT services provider with focus on AI-led Managed Services and Digital Transformation.

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER) conducts full spectrum military cyberspace operations in order to enable freedom of action in cyberspace and deny the same to the adversary.

CySecK

CySecK

CySecK is a Centre of Excellence in Cybersecurity formed in 2017 by the Government of Karnataka, as part of the Technology Innovation Strategy.

SilverEdge Government Solutions

SilverEdge Government Solutions

SilverEdge is a next generation provider of innovative and proprietary cybersecurity, software, and intelligence solutions for the Defense and Intelligence Communities.

DeXpose

DeXpose

DeXpose is a hybrid dark/deep web monitoring and attack surface mapping platform to help you find compromised data or exposed assets related to your organization way before threat actors.