

- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Because there’s so much money to be made from attacks against businesses, today’s cybercriminals are highly skilled and very well-funded… and that makes them an even bigger threat to enterprises.
Cybercriminals are running efficient organizations that have the resources to develop increasingly sophisticated threats that can:
• Defraud enterprises
• Steal valuable intellectual property
• Disrupt day-to-day business operations
• Steal confidential information about customers
• Hold businesses to ransom – by encrypting and ‘locking up’ essential data


- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
In conjunction with the Department of Information and Communications Technology (DICT), a giant technology company will award 500 Cybersecurity Career Certificate scholarships to qualified government employees, equipping them with the necessary skill set to identify and mitigate common cybersecurity risks, threats, and vulnerabilities.
Even without prior experience, qualified government employees will be able to acquire the skills necessary for an entry-level position in cybersecurity through the 3–6-month self-paced programme.
Ivan John Uy, DICT Secretary stated that the Cybersecurity Career Certificate will help the Filipino workforce become more globally competitive. This will also empower them with the skills necessary to withstand cyber-attacks and create a safer, more secure online environment.
The DICT acknowledged the generous effort to aid the Philippines in its digital transformation voyage and anticipates additional opportunities for cooperation.
In collaboration with DICT Regional Offices, the ICT Literacy and Competency Development Bureau (ILCDB) is responsible for the evaluation, nomination, distribution, and monitoring of these accounts to qualified recipients of the Career Certificate Scholarship.
According to the International Information System Security Certification Consortium’s (ISC2) Workforce Study, there is a global shortage of 3,4 million cybersecurity professionals. Currently, there are only 202 Certified Information Systems Security Professional (CISSP)-certified cybersecurity professionals in the Philippines.
It is essential to create more opportunities for Filipinos to acquire the necessary digital skills and pursue the cybersecurity field competitively. The institution is committed to working closely with local collaborators from the public and private sectors to assist in the development of the country’s next generation of cybersecurity professionals and experts. Interested candidates can contact ILCDB via email at ilcdb@dict.gov.ph.
The Cybersecurity Certificate is a wholly online programme that equips learners with the necessary skills for an entry-level position in cybersecurity, regardless of prior experience. Python, Linux, SQL, Security Information and Event Management (SIEM) tools, and Intrusion Detection Systems (IDS) will be utilised.
Participants will gain knowledge regarding Programming for cybersecurity tasks, frameworks, and controls that inform security operations, utilising security information and event management (SIEM) tools for cybersecurity, detecting and responding to incidents using an intrusion detection system, and performing packet capture and analysis.
Cybersecurity education for government employees is of the utmost importance. Local, regional, and national government institutions handle and store a vast quantity of sensitive and confidential information.
This includes citizen data, national security secrets, financial records, and systems vital to the nation’s infrastructure. Without adequate cybersecurity measures, these priceless assets are susceptible to cyber threats and attacks.
Government employees play a crucial role in protecting these assets and the nation’s security. By studying cybersecurity, individuals acquire the knowledge and skills required to identify potential risks, mitigate vulnerabilities, and respond effectively to cyber incidents.
This includes being aware of the most recent cyber threats, recognising social engineering techniques, and instituting secure data handling and network access practices.
In addition, cybercriminals frequently target government employees due to the valuable information they possess. By training government personnel about cybersecurity, they become more resilient to these risks, lowering the likelihood of successful assaults and data breaches. Hence, cybersecurity expertise is necessary for effective policymaking and governance.
Government officials comprehend the implications and repercussions of cybersecurity-related decisions to create effective laws, regulations, and guidelines. Governments can improve their overall cybersecurity posture and protect critical infrastructure, essential services, and citizen data if they have personnel that is well-informed and knowledgeable about cybersecurity.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
In light of the risks posed by the advancement of information technology and the internet, the government, state, and the entire political system have taken significant measures to enhance the safeguarding of children within the online environment.
According to UNICEF, children are increasingly exposed to various risks, including the concerning issue of cyberbullying. The agency reports that one in five young individuals have experienced online bullying.
Reports have shown that the national emergency telephone number for child protection, 111, received nearly 420 calls about child protection in the online environment and 18 notifications about channels or video clips with harmful content for children in 2022. The figures in the first five months of this year were 128 calls and three notifications.
An expert from UNICEF’s children’s protection programme said that strategies to address cyber-bullying and abuse should be part of the broader child protection strategies. Cooperation and coordination among stakeholders are key to success in this work.
The Guidelines for Industry on Child Online Protection, developed by UNICEF and the International Telecommunication Union (ITU), serve as a framework for businesses. These guidelines offer solutions that businesses can adopt to ensure the protection and well-being of children, while also promoting a healthy and creative internet experience for children themselves.
Dang Hoa Nam, Director of the Department of Child Affairs under the Ministry of Labour, Invalids and Social Affairs, emphasised the importance of collective efforts in establishing a digital environment that is both safer and healthier for children. He highlighted the significance of drawing from both domestic and international experiences to implement targeted and practical measures aimed at ensuring children’s safety in the online realm.
Vietnam has established a comprehensive legal framework to protect children in the digital sphere, including laws such as the Law on Children, the Law on Cyber Information Security, and the Law on Access to Information. These laws provide a crucial legal foundation for child protection initiatives.
To safeguard children in the online environment, the government and the Prime Minister have issued several significant documents. These include the National Action Programme for Children in the 2021-2030 period and the programme on protection of and support for children.
Furthermore, Vietnam, alongside other ASEAN member nations, has collectively endorsed crucial agreements to protect children’s welfare online. This includes the adoption of the Declaration on the Protection of Children from all Forms of Online Exploitation and Abuse in ASEAN in 2019, as well as the Declaration on the Elimination of Bullying of Children in ASEAN.
The Authority of Information Security under the Ministry of Information and Communications (MIC) and several city Information and Communications Departments held a conference earlier this May on the launch and evaluation of the national cyber security and safety strategy. The event was held in Ha Long City.
As OpenGov Asia reported, servers are the primary targets of cyber-attacks in the country, aimed at stealing passwords and data. Last year in Vietnam, computer viruses resulted in economic losses amounting to VND 21.2 trillion (US$ 903 million). To ensure cybersecurity, MIC collaborated with various agencies to conduct three nationwide security exercises. The authority directly prevented over 3,600 fraudulent websites, safeguarding nearly 4 million people or approximately 6% of internet users.
Vietnam has set a goal to establish a cybersecurity research and development centre, safeguard information systems in 11 critical sectors, and establish cybersecurity forces at ministries, sectors, and state agencies by 2025.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Given the recent rapid development of artificial intelligence (AI), the Ministry of Digital Affairs (moda) announced that it has become an official partner of an international non-governmental organisation to ensure the alignment of AI applications with the interests of the public and to develop the necessary application services for society.
As a member of the “Alignment Assemblies” project, moda’s global and public objectives are to assist Taiwan in building public consensus regarding the needs and risks of AI and to collectively address the “Alignment Problem” of AI.
Beginning in July of this year, the moda intends to influence the direction of AI development through Ideathons, employing a citizen participation and deliberation model and using Taiwan as a test bed.
The moda emphasised that the international non-governmental organisation supports the technology that incorporates social development, industrial advancement, and public confidence. It believes that the development of AI should prioritise ethics and the public interest.
During the Democratic Summit in March of this year, the moda, led by Minister Audrey Tang, launched this initiative to create a global consensus among people and ensure the alignment of AI with human values. By participating in this initiative, the moda hopes to promote digital democracy and global partnerships while fostering a diverse and inclusive digital culture for the development of AI in Taiwan.
The moda announced that it will initiate the “Democratising AI Futures” dialogue through Ideathons and invite public participation in the third quarter of this year as well as organise seminars to discuss how to respond to the development of generative AI.
Minister Audrey explained that AI has brought about profound social changes and that issues such as algorithms, intellectual property, technological ethics, public services, and social impact have garnered significant attention, posing new challenges to democratic governance.
In response to the social concerns raised by the trend of generative AI, moda is actively drafting the “Basic Law on Artificial Intelligence.” The moda also expects that policymakers and technology developers will have access to vital information to ensure that the development of AI serves the public interest.
In the fast-changing technological world, fostering consensus on the requirements and hazards associated with AI is essential. As AI continues to evolve and permeate numerous elements, it is critical to ensure that its development and deployment are in line with the interests and values of society.
Building consensus allows for the identification and prioritisation of ethical considerations in AI development. It enables stakeholders to address possible issues such as bias, privacy concerns, and job displacement cooperatively, as well as cooperate towards developing AI systems that adhere to ethical norms and protect human rights.
Also, achieving consensus on AI enables policymakers to make educated decisions when developing legislation and policies. Policymakers may establish comprehensive frameworks that balance innovation, social demands, and possible risks connected with AI technology by considering the different perspectives and concerns of the public.
Building consensus aids in the establishment of public trust and acceptance of AI systems. When the public participates in AI debates and decision-making processes, people feel more empowered and are more inclined to trust and adopt AI applications that are consistent with their values and meet their requirements.
Consensus-building aids in resolving biases and guaranteeing fairness in AI algorithms and systems. Potential biases can be recognised and minimised by integrating a diverse variety of stakeholders, including marginalised populations and underrepresented groups, resulting in more equal opportunities in AI systems.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Perth’s newest technology hub has been established through a partnership between the University of Western Australia and a prominent Australian multinational bank, aiming to cultivate the future generation of skilled professionals. The Bankwest and CBA Perth Tech Hub have been created to bolster the digital economy in Western Australia by supporting an expanding group of digitally proficient professionals.
The Perth Tech Hub is anticipated to generate over 100 new job openings, encompassing roles in data science, cybersecurity, and software engineering. These positions will contribute to projects that bring advantages to customers, employees, and the communities in which CBA and Bankwest operate.
The collaboration was warmly received by the Head of the Department for Computer Science and Software Engineering at UWA, who recognized its potential to offer invaluable career experience for upcoming technology professionals. The shared focus on teaching and research in emerging digital technologies, including computer science, cybersecurity, data science, artificial intelligence, and software engineering, was emphasised.
Through this partnership, a range of joint activities will be pursued, such as industry-led skills workshops, collaborative projects, work-integrated learning placements, and technology-focused events. These initiatives aim to equip UWA students with the necessary skills and knowledge to address the existing technology skills shortage not only in Australia but also on a global scale.
According to the Bank’s CIO, the establishment of the Perth Tech Hub aligns with their nationwide effort to drive technological advancement and expand their team of skilled technology professionals in Western Australia. The Hub is envisioned as an innovative and collaborative space that will cater to highly skilled technologists, dedicated engineers, analysts, and developers.
The bank believes that its early careers programme in the technology industry is among the finest and expresses its ambition to foster its growth in WA. The partnership with prominent universities in the state is expected to facilitate a comprehensive enhancement of technology capabilities, talent pipeline, and innovation across the sector.
The Tech Council of Australia (TCA) Research, unveiled at Parliament House by the Minister for Industry and Science, and the Minister for Skills and Training, has disclosed a noteworthy development in tech employment.
According to the research, there has been an 8% surge in tech jobs in the previous year, resulting in a total tech workforce of 935,000 as of February 2023. This figure accounts for 78% of the target set by Prime Minister Albanese in 2030.
The report found that 10,500 jobs were added to the tech sector in the past three months, up until March 2023. Notably, the majority of this growth occurred in the indirect tech sector, referring to tech-intensive roles within non-tech industries. This expansion was observed across various sectors such as retail, banking, professional services, government, and mining.
While reports suggest downsizing in tech firms, it is noteworthy that jobs in the direct tech sector have remained stable. Surprisingly, the research conducted by TCA reveals a fascinating trend: for every job lost in the past quarter, a remarkable 20 new jobs have been created. This signifies strong resilience and growth within the direct tech sector.
The growth observed, as highlighted by the CEO of TCA, is seen as a demonstration of the integral nature of tech jobs within all sectors of the Australian economy. The focus of the world’s leading economies is believed to be on digitally upskilling their workforce should also be a priority for Australia. The intention is for Australia to be positioned at the forefront of this transition.
The expansion of tech jobs in non-traditional tech industries is seen as an indication of a long-term structural change in the Australian economy. Furthermore, it indicates the deep integration of digital skills into all aspects of the economy.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The potential for nations to jointly combat cyber threats, fortify cybersecurity infrastructure, and protect vital digital systems, assuring stability and security in the digital sphere, makes cooperation on digital resilience essential. With this, a deeper Taiwan-U.K. tie and collaboration on digital resilience were recommended by Taiwan’s Minister for Digital Affairs Audrey Tang and former British Prime Minister Liz Truss.
Information security is a major concern on a global scale, according to Minister Audrey. Authoritarian regimes are using emerging technologies to consolidate their power, manipulate the internet to control digital communities, and create deep fake audio and images.
She continued by saying that data security is a matter of national security. To coordinate the government’s comprehensive information security initiatives and associated resources, the moda has been given this mandate.
The main plan of action focuses on proactive defence and the application of cutting-edge technologies to stop threats and obstruct attack sources. Such a strategy entails adopting the Interplanetary File System (IPFS), implementing a zero-trust architecture, and boosting capabilities in crucial areas like infrastructure information security.
By implementing these steps, Taiwan’s total information security environment is anticipated to be fundamentally improved, and a cross-domain defence system that is simple to defend and challenging to attack will be built.
A proof of concept for non-synchronous orbiting satellites as an emergency backup network can be found in The Planning of Strengthening the Digital Resilience of Communication Networks by Applying Emerging Technologies in Emergency or Wartime by the moda.
The project will ensure that command and control operations always continue without interruption by installing 700 domestic and three international satellite hot spots. The project is open to all satellite operators worldwide, including those operating in the United Kingdom, to expand prospective partnerships for satellite communication services.
Nations may improve their capacity to identify, prevent, and respond to cyberattacks, safeguard sensitive data, and promote a resilient digital ecosystem that supports innovation and economic growth by exchanging knowledge, resources, and best practices. In an interconnected world where digital vulnerabilities pose serious threats to public safety, national security, and the running of key services, such cooperation is crucial.
Additionally, Taiwan and the U.K. are attempting to increase trade in a variety of traditional and digital economy sectors. It is envisaged that this partnership would strengthen ties and open new possibilities for productive cooperation. Minister Audrey noted that Taiwan and the U.K. are both citizens of the free world united by a shared devotion to liberty, democracy, human rights, and the rule of law.
Additionally, the Taiwan-France digital resilience exchange, according to a previous report from OpenGov Asia, is crucial for boosting cybersecurity and digital security, encouraging the exchange of best practices, highlighting the value of digital literacy and co-creation, and boosting Taiwan’s international recognition and participation.
In light of this, a French delegation and Minister Audrey, Taiwan’s minister for digital affairs, recently met to talk about boosting digital resilience. The Minister responded by presenting Taiwan’s “Shared by All, Cash for Everyone” strategy in answer to the French side’s worries about digital governance. Online registration for all services, including terminals at ATMs and post offices, is made possible by this policy.
Minister Audrey noted that Taiwan is putting up a legal framework to promote “Data Altruism,” which encourages all sectors to share non-personal data for the public good, in accordance with the Data Governance Act (DGA) of the European Union. The goal is to increase the social resilience of the democratic alliance.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The Department of Information and Communications Technology (DICT) invites all stakeholders, advocates, and concerned individuals to submit feedback, comments, and suggestions on the drafted National Cybersecurity Plan (NCSP) 2023-2028 to provide a safe and reliable cyberspace for all Filipinos.
The goal of the public consultation on the draught of the NCSP 2023-2028 is to improve the final document, which is expected to be released by the end of 2023. All parties interested may offer their suggestions and comments to the Office of the Assistant Secretary for Cybersecurity and Upskilling via email at oascu@dict.gov.ph. The outline NCSP 2023-2028 is organised around six (6) pillars, including:
- Enactment of the “Cybersecurity Act” to strengthen the policy framework;
- Secure and protect Critical Information Infrastructures (CII);
- Proactively defend the government and people in cyberspace;
- Operational and well-coordinated network of Computer Emergency Response Team (CERT) and SOC;
- Capacitate workforce in cybersecurity; and
- Enhancing international cooperation.
Ivan John E. Uy, secretary of the DICT, emphasised the importance of concerted action from all interested parties to create a trusted, dependable, and safe online environment for Filipinos.
“The NCSP 2023-2028 shows the importance of convergence among all government agencies in delivering our mission. It outlines steps on how each government agency can coordinate all their cybersecurity initiatives through the National Cybersecurity Inter-Agency Committee (NCIAC). It also harmonises all organisation CERT and defined two national-level CERTs,” said Secretary Ivan.
He also stated that there was a steady increase in internet-based transactions during and after the COVID-19 outbreak. The country gradually evolved to cashless transactions as electronic commerce and e-banking became commonplace, mostly because of inventions from the private sector. Cybercrime incidences rose as these advanced.
Cyberthreat actors took use of flaws and vulnerabilities in processes, technology, and human behaviour. In response to these changes, the National Cybersecurity Plan 2023–2028 (NCSP 2023–2028) was created.
The goal of DICT is to give every Filipino access to a trusted, secure, and reliable online environment. This demonstrates the necessity of protecting the government and the public online, as well as the significance of fostering the kind of trust required for online commerce to flourish.
The NCSP’s second iteration drew on the preceding strategy’s results while also demonstrating a policy shift. DICT is now attempting to establish a Cybersecurity Act to balance the economic linkages impacting noncompliance with cybersecurity legislation.
The new strategy also promotes policy based on standards and risk-based methods. Individual organisations, rather than entire sectors, are designated as CIIs if they fail, depending on their size and influence. A renewed emphasis on developing the cyber workforce, as well as the significance of improving international collaboration in cybersecurity, was also emphasised.
Most particularly, the NCSP 2023-2028 demonstrates the importance of collaboration among all government departments in carrying out its mandate. It details how each government agency can use the National Cybersecurity Inter-Agency Committee (NCIAC) to coordinate all their cybersecurity initiatives. It also unifies all organisation CERTs and establishes two national-level CERTs.
Though the NCSP 2023-2028 has a sublime goal, DICT thinks this strategy can be successful with the assistance of all government agencies, the private sector, and all departments of government.
The National Cybersecurity Plan must be developed by DICT in accordance with RA 10844, hence, the National Cybersecurity Plan 2028 (NCSP 2028) draft is meant to serve as a guide for consultations, with the goal of using comments to improve the final version of the NCSP, which is scheduled to be released before the end of 2023.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The Privacy Commissioner, Michael Webster, has issued warnings regarding safeguarding personal information while utilising artificial intelligence (AI), addressing the private and public sectors. In releasing his expectations, Webster emphasised the need for adaptability as technological advancements in AI continue to evolve rapidly.
Webster’s emphasis on organisations exercising caution in handling personal information within the realm of AI highlights the critical need to balance the potential gains in productivity with the inherent privacy risks involved. With the increasing reliance on AI systems like ChatGPT, it becomes crucial to address the challenges associated with managing and controlling the information fed into these systems.
One key concern lies in the difficulty of retrieving information once it has been input into AI systems. Unlike traditional data storage methods, where retrieval is relatively straightforward, AI systems often lack easily accessible mechanisms to retrieve specific information. This poses significant challenges in ensuring the accuracy, integrity, and privacy of the data that has been processed.
Furthermore, the controls governing the usage of personal information within AI systems are often limited in scope. As AI technologies rapidly advance, it becomes imperative to establish robust frameworks and mechanisms to regulate and govern the use of personal data. Without adequate controls, there is a risk of unauthorised access, misuse, or inappropriate handling of sensitive information, leading to privacy breaches and potential harm to individuals.
Webster’s warning reminds organisations to carefully evaluate and address these concerns before implementing AI solutions. Organisations must thoroughly assess AI’s potential risks and implications, especially when handling personal or confidential information. This includes considering the AI system’s privacy impact, security measures, and ethical considerations.
In light of these concerns, Webster emphasised that agencies should conduct comprehensive due diligence and privacy analyses to ensure compliance with the law before venturing into the realm of generative AI. He advised against incorporating personal or confidential information into AI systems unless explicit confirmation is obtained that such data will not be retained or reused. One alternative approach could involve removing any re-identifiable information from input data.
Considering the potential privacy implications, staff members were encouraged to evaluate the necessity and proportionality of using AI and to explore alternative methods if available. Seeking approval from supervisors and privacy officers and transparently informing customers about the use of AI were recommended practices. Additionally, Webster emphasised the importance of human review of any AI-generated information before taking any consequential actions based on it.
Webster further outlined the steps agencies should undertake when considering the implementation of AI. These include conducting due diligence, performing a privacy analysis, and carrying out a Privacy Impact Assessment. Seeking feedback from impacted communities, including Māori, and requesting clarification from AI providers regarding privacy protections designed into their systems were identified as critical components of the evaluation process.
Before this, the commissioner had communicated his concerns to government agencies, cautioning against the hasty adoption of AI without proper assessment. He underscored the need for a holistic, government-wide response to address the emerging challenges posed by this technology.
The Privacy Commissioner’s warnings emphasise the imperative of preserving privacy rights when utilising AI. Organisations must exercise caution, conduct thorough assessments, and implement adequate safeguards to protect personal information in the face of AI’s evolving landscape.