Remove Information Remove Intellectual Property Remove Technology
article thumbnail

AI & the enterprise: protect your data, protect your enterprise value

CIO

This will require the adoption of new processes and products, many of which will be dependent on well-trained artificial intelligence-based technologies. For example, employees might inadvertently broadcast corporate secrets by inputting sensitive company information or source code into public-facing AI models and chatbots.

article thumbnail

3 steps to get your data AI ready

CIO

While many organizations have already run a small number of successful proofs of concept to demonstrate the value of gen AI , scaling up those PoCs and applying the new technology to other parts of the business will never work until producing AI-ready data becomes standard practice.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sweat the small stuff: Data protection in the age of AI

CIO

Most of the evidence is academic at this point in time.However, executives who have deployed their own models have begun to focus on how to protect their integrity, given it will be only a matter of time before a major attack becomes public information, resulting in brand damage and potentially greater harm.

article thumbnail

New trade body wants to license training data for AI use

CIO

Seven companies that license music, images, videos, and other data used for training artificial intelligence systems have formed a trade association to promote responsible and ethical licensing of intellectual property.

article thumbnail

EU taps AI experts to develop compliance framework for AI regulations

CIO

This could force companies to share sensitive information, raising concerns over intellectual property and competitive advantage. By addressing these issues through clearer guidelines, the EU’s efforts could help alleviate those concerns, encouraging more businesses to adopt AI technologies with greater confidence.

article thumbnail

Overcoming data compliance and security challenges in the age of AI

CIO

AI technologies, like large language models (LLMs), require large and diverse datasets to train models, make predictions, and derive insights. AI technologies may include multiple components and data sources, which can also lead to questions regarding data residency. How are access controls implemented?

Security 307
article thumbnail

Cognizant sues Infosys for misusing shared information

CIO

A lawsuit filed in a Texas federal court on Friday is a good illustration of the problems that can arise when two competitors — or even potential competitors — sign Non-Disclosure and Access Agreements (NDAAs) to share sensitive information to ostensibly help mutual customers. Rather, the complaint alleges that they misused the information.