International Agreement To Regulate Artificial Intelligence

Britain's newly installed Labour government has now signed the first legally-binding international treaty governing safe use of Artificial Intelligence (AI). Alongside EU countries, others expected to become signatories include the United States  and Australia.

This builds on the initiative from the previous Conservative governments so-called 'Bletchley Declaration' to make progress in addressing the  technology risks, developing  multilateral agreement to test advanced AI Models.

The new framework commits parties to collective action to manage AI products and protect the public from potential misuse. In particular, it commits countries to act against activities which pose a risk to public services and the wider public.

The treaty is intended to protect human rights, democracy and the rule of law from the potential threats posed by AI, which is widely predicted to bring significant benefits like boosting productivity and healthcare. The new convention includes important safeguards against its risks, such as the spread of misinformation or using biased data which may prejudice decisions.

This new agreement has three over-arching safeguards:

  • Protecting human rights, including ensuring people’s data is used appropriately, their privacy is respected and AI does not discriminate against them.
  • Protecting democracy by ensuring countries take steps to prevent public institutions and processes being undermined.
  • Protecting the rule of law, by putting the onus on signatory countries to regulate AI-specific risks, protect its citizens from potential harms and ensure it is used safely

The treaty will ensure countries monitor its development and ensure any technology is managed within strict parameters.

As the first legally-binding international treaty on AI, the Convention will ensure there is a united front across the world to managing the dangers of the technology in line with their shared values.

British Justice Secretary Shabana Mahmood commented "Artificial Intelligence has the capacity to radically improve the responsiveness and effectiveness of public services, and turbocharge economic growth.
However, we must not let AI shape us, we must shape AI."

Keiron Holyome, VP UKI & Emerging Markets at BlackBerry said “To truly outrun cybercriminals and maintain a defensive advantage, robust frameworks for AI governance and ethical standards must be established, ensuring responsible use and mitigating risks. "The first legally binding international AI treaty is another step towards such recommendations for both AI caution and applications for good. Collaboration between governments, industry leaders, and academia will be increasingly essential for sharing knowledge, developing best practices, and responding to emerging threats collectively...

"AI stands at a pivotal juncture in cyber security. Its unpredictability and evolving nature cannot be ignored, especially when in the hands of malicious cyber criminals."

British government Mineter for Science, Innovation and Technology, Peter Kyle said "AI holds the potential to be the driving force behind new economic growth, a productivity revolution and true transformation in our public services, but that ambition can only be achieved if people have faith and trust in the innovations which will bring about that change." 

Britain continues to play a key role as an international leader in safe, secure, and trustworthy AI, establishing the world-first AI Safety Institute, and playing a key role in the negotiations which have framed the Convention. 

Image: Unsplash

You Might Also Read: 

Global AI Safety: Scientists Can Move The Needle:

DIRECTORY OF SUPPLIERS - AI Security & Governance:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« New Exploits & Examples Of Online Fraud
British Security Agency Accuses Russian Military Of Cyber Sabotage  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

HANDD Business Solutions

HANDD Business Solutions

HANDD are independent specialists in data protection with expertise at every stage of the Protect, Detect and Respond cycle, from consultancy and design, right through to installation.

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

Cyxtera Technologies

Cyxtera Technologies

Cyxtera offers powerful, secure IT infrastructure capabilities paired with agile, dynamic software-defined security.

Fugue

Fugue

Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies.

SecureThings

SecureThings

SecureThings focus is to provide guidance and technology to secure connected vehicles in order to build end-to-end security for the automotive industry.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

Blaick Technologies

Blaick Technologies

Blaick is an Israeli cyber-security company which deploys proprietary Artificial Intelligence threats detection technology for early prevention of online cyber crime.

ISECURION Technology & Consulting

ISECURION Technology & Consulting

ISECURION is an information security consulting company. We provide a unique blend of services to our customers catering to the current information security landscape.

National Cybersecurity Consortium (NCC)

National Cybersecurity Consortium (NCC)

The NCC’s mandate is to keep Canada’s cyber and critical infrastructures and citizens safe while ensuring Canada’s global competitiveness and leadership in cybersecurity.

Retruster

Retruster

Protect your users against phishing emails, ransomware & fraud with the most advanced, user-friendly, non-intrusive solution available.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.

Sweet Security

Sweet Security

Sweet Security delivers Runtime Attack Security for Cloud Workloads.

LockMagic

LockMagic

Lockmagic is an information asset management solution to protect, track, audit and control accesses to sensitive information inside and outside your organization.

Ebryx

Ebryx

At Ebryx, we are at the forefront of cybersecurity innovation, leveraging over a decade of expertise to protect and empower organizations worldwide.

Qryptonic

Qryptonic

Qryptonic pioneers next-generation cybersecurity by leveraging the unparalleled capabilities of quantum computing to defend against evolving threats.