Back Share
Strategies

Considerations in assessing trustworthy AI - Resilience to attack and security

governance-question

“Compliance with this assessment list is not evidence of legal compliance, nor is it intended as guidance to ensure compliance with applicable law. Given the application-specificity of AI systems, the assessment list will need to be tailored to the specific use case and context in which the system operates. In addition, this chapter offers a general recommendation on how to implement the assessment list for Trustworthy AI though a governance structure embracing both operational and management level.” (High-Level Expert Group on AI, 2019, p. 24)“TRUSTWORTHY AI ASSESSMENT LIST (PILOT VERSION) “Technical robustness and safety Resilience to attack and security: - Did you assess potential forms of attacks to which the AI system could be vulnerable? - Did you consider different types and natures of vulnerabilities, such as data pollution, physical infrastructure, cyber-attacks? - Did you put measures or systems in place to ensure the integrity and resilience of the AI system against potential attacks? - Did you verify how your system behaves in unexpected situations and environments? - Did you consider to what degree your system could be dual-use? If so, did you take suitable preventative measures against this case (including for instance not publishing the research or deploying the system)?” (High-Level Expert Group on AI, 2019, p. 27)

Overarching Principles Beneficence
Title Considerations in assessing trustworthy AI - Resilience to attack and security