EU Agrees Regulations For Artificial Intelligence

European Union (EU) officials have reached a provisional deal on the world's first comprehensive laws to regulate the use of Artificial Intelligence (AI). The agreement was reached following lengthy negotiations over new rules for member states about AI in systems like ChatGPT and Facial Recognition technology.

The EU Parliament will vote on the AI Act proposals early in 2024, but any legislation will likely come int to force before 2025. 

“This is a historical achievement, and a huge milestone towards the future! Today’s agreement effectively addresses a global challenge in a fast-evolving technological environment on a key area for the future of our societies and economies...  we managed to keep an extremely delicate balance: boosting innovation and uptake of artificial intelligence across Europe whilst fully respecting the fundamental rights of our citizens.” said 
Carme Artigas, Spanish secretary of state for Digitalisation and Artificial Intelligence

The agreement places the EU alongside of the US, China and the United Kingdom in the race to regulate AI and protect the public from risks that include potential threat to life that many fear the rapidly developing technology carries.

AI Applications Blocked By The EU 

Recognising the potential threat to citizens’ rights and democracy posed by certain applications of AI, the proposed legal framework will prohibit the following:-

  • Biometric categorisation systems that use sensitive characteristics (e.g. political, religious, philosophical beliefs, sexual orientation, race).
  • Untargeted scraping of facial images from the internet or CCTV footage to create facial recognition databases.
  • Emotion recognition in the workplace and educational institutions.
  • Social scoring based on social behaviour or personal characteristics.
  • AI systems that manipulate human behaviour to circumvent their free will.
  • AI used to exploit the vulnerabilities of people (due to their age, disability, social or economic situation).

The EU proposed rules include safeguards on the use of AI within the EU as well as limitations on its adoption by law enforcement agencies. Consumers would have the right to launch complaints and fines could be imposed for violations.

EU Internal Market Commissioner Thierry Breton described the plans as "historic", saying it set "clear rules for the use of AI... it is much more than a rulebook - it's a launch pad for EU start-ups and researchers to lead the global AI race". European Commission President Ursula von der Leyen said the AI Act would help the development of technology that does not threaten people's safety and rights. On Twitter/X  she said it was a "unique legal framework for the development of AI you can trust".

The EU Parliament defines AI as software that can "for a given set of human-defined objectives, generate outputs such as content, predictions, recommendations or decisions influencing the environments they interact with". 

ChatGPT and DALL-E are examples of what is called Generative AI. These programs learn from vast quantities of data, such as online text and images, to generate new content which feels like it has been made by a human. So-called "chatbots" like ChatGPT & Google's Bard, can have text conversations, while other AI programs like DALL-E can create images from simple text instructions.

EU Council:    EUParliament:     BBC:     Guardian:    NYTimes:    FT:    CNBC:     Image: monsitj

You Might Also Read: 

Guidelines For AI Systems Development:

DIRECTORY OF SUPPLIERS - AI Security & Governance:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Iranian Hackers Attack US Water System
Generative Artificial Intelligence Models Leak Private Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CyberSource

CyberSource

CyberSource provides online payment and fraud management services for medium and large-sized merchants.

Cyber Indemnity Solutions (CIS)

Cyber Indemnity Solutions (CIS)

CIS is an InsurTech company focused on licensing innovative cyber risk insurance solutions to the global insurance industry.

Konfidas

Konfidas

Konfidas provide high-level cybersecurity consulting and professional tailored solutions to meet specific cybersecurity operational needs.

IDpendant

IDpendant

IDpendant offers a wide range of services, including authentication technology, client security products, single sign on systems, encryption solutions, card and mobile device management systems.

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

Security & Intelligence Agency (SOA) - Croatia

Security & Intelligence Agency (SOA) - Croatia

SOA is the Croatian security and intelligence service. Areas of activity include Cyber Security and Information Security.

Fortanix

Fortanix

Fortanix Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats.

Secon Cyber Security

Secon Cyber Security

Secon Cyber Security is an Advanced Managed Security Services Provider with long standing experience of providing cyber security solutions to customers ranging from small to large enterprises.

Y-PARC

Y-PARC

Y-PARC is a center of excellence for cybersecurity, precision industries and medtech, fostering innovation and development and support for startups.

Cyber Protection Group (CPG)

Cyber Protection Group (CPG)

Cyber protection Group specialize in Penetration Testing. We work with enterprise level companies as well as small to medium sized businesses.

SRG Security Resource Group

SRG Security Resource Group

SRG Security Resource Group is a Canadian company dedicated to providing world-class Physical and Cyber Security services.

Mitigo Group

Mitigo Group

Mitigo offers a well considered and effective approach to keeping businesses completely secure from any digital attacks.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

SEALSQ

SEALSQ

For the last 25 years, SEALSQ have been developing secure semiconductor chips, secure embedded firmware, and tested hardware provisioning services to serve the vision of a safer connected world.

Security Solutions Services (S-3)

Security Solutions Services (S-3)

S-3 specialize in crafting tailored network design, security hardware, software, and storage solutions for businesses of all sizes.

National Critical Information Infrastructure Protection Centre (NCIIPC) - India

National Critical Information Infrastructure Protection Centre (NCIIPC) - India

NCIIPC's mission is to protect the Critical Information Infrastructure of India, from unauthorized access, modification, use, disclosure, disruption, incapacitation or destruction.