# CTO Connection

## Data privacy for technology leaders

* Geeta Chauhan
* slides:

{% embed url="<https://www.slideshare.net/geetachauhan/building-ai-with-security-and-privacy-in-mind>" %}

![](https://1264711708-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MN5KTojsYFTNPgT92_7%2F-MfUv_7QiARKeupXjFf4%2F-MfUwBpVMslZ9vVdhtgp%2FScreen%20Shot%202021-07-26%20at%208.12.11%20AM.png?alt=media\&token=cd3c51f9-f074-4c41-82bf-b12a1041a3a0)

### Privacy Challenges in AI

* **Privacy Tradeoff** between protecting data privacy and training AI/ML models
* **Tensions** associated with data minimization and retention
* **Proliferation of AI/ML models** heighten lack of public understanding
* As artificial intelligence evolves, it magnifies the ability to use information in ways that can **intrude on privacy interests**
* Increasingly **sensitive nature of data** used for research raises other privacy challenges
* Sourcing of **data that is free of bias**

![](https://1264711708-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MN5KTojsYFTNPgT92_7%2F-MfUv_7QiARKeupXjFf4%2F-MfUwGDwnTEp50HhJ1BL%2FScreen%20Shot%202021-07-26%20at%208.12.31%20AM.png?alt=media\&token=9c0725d1-5bee-42ff-b36c-99688d13b498)

### Privacy Challenges

Data input needs of the AI need to be balanced against the needs and concerns of consumers and regulations

* Data for AI Model: Collected data need business justifications for best performance
* Consumer needs and regulations
  * Consumer Concerns and Benefits: more proactive user-centric approach to know what the consumers are needed and comfortable with
  * Government Regulations: GDPR, CCPR
  * Business Concerns: explicitly not to collect certain types of data out of concerns for privacy&#x20;

![](https://1264711708-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MN5KTojsYFTNPgT92_7%2F-MfUv_7QiARKeupXjFf4%2F-MfUwTRdzP_lGgP-D-5d%2FScreen%20Shot%202021-07-26%20at%208.13.26%20AM.png?alt=media\&token=7935c2ba-2f1d-4407-93da-1c9cf2cfc29c)

### Privacy Preserving ML Techniques

![](https://1264711708-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MN5KTojsYFTNPgT92_7%2F-MfUv_7QiARKeupXjFf4%2F-MfUzLBtegZU2JWvBTyI%2FScreen%20Shot%202021-07-26%20at%208.25.57%20AM.png?alt=media\&token=e8de70de-6cdb-441c-aed7-b57600ec8649)

#### Homomorphic Encryption

![](https://1264711708-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MN5KTojsYFTNPgT92_7%2F-MfUv_7QiARKeupXjFf4%2F-MfUzVH2Hxxxf_yGGBEs%2FScreen%20Shot%202021-07-26%20at%208.26.39%20AM.png?alt=media\&token=a544660f-56ec-494c-90c3-791ed31073bc)

![](https://1264711708-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MN5KTojsYFTNPgT92_7%2F-MfUv_7QiARKeupXjFf4%2F-MfUzjt94UZdSWwwlIR-%2FScreen%20Shot%202021-07-26%20at%208.27.43%20AM.png?alt=media\&token=f2d23612-fe8f-4b7b-aa5c-062f3c32a453)
