Data Privacy Is Key To The Technology Battle With China

The US needs to get together with its allies to set privacy standards around new technologies like AI, according the President Biden's National Security Advisor, Jake Sullivan. Speaking at the recent summit meeting of the National Security Commission for Artificial Intelligence (NSCAI) Sullivan said that actions  aimed at setting multinational standards on 5G and other new technologies are now urgently needed.

One such initiative is the Quad Critical and Emerging Technology Working Group, composed of representatives from India, Australia, Japan and the United States, but with this project a number of disagreements have emerged over consumer data and how some American companies were treating it. 

In 2018, the EU used the the General Data Protection Regulation (GDPR) against US companies that were using European user data and the EU has continued to restrict data sharing. However, Sullivan said concerns about privacy wouldn’t necessarily be a barrier to better US and allied partnership on AI

In fact, privacy concerns actually undersline the US and EU's shared values and provide an important contrast with less democratic states like China and Russia, Sullivan said.

“I actually think there are innovations in the space and standards we can set that will give us the advantage over those societies that instead have shredded any notion of privacy... The large majority of the world actually is not ready to sign onto a vision of the future that says you have absolutely no privacy. No Trust. No security… big data owned by the government,” he said. 

Sullivan focused on emerging technologies like “privacy-preserving machine learning,” that can allow machine learning algorithms to process data without revealing personal information in the data itself. Such technologies “promise to overcome data privacy challenges while still delivering the value of big data,” he said. That tracks closely with the NSCAI Commission Report, which sought to help the United States to compete on AI.  

As AI is emerging as a vital technology the will likely become one of the most powerful tools in for the benefit of humanity. According to Sullivan “These advances are not science fair experiments; they are improving life and unlocking mysteries of the natural world. They are the kind of discoveries for which the label “game changing” is not a cliché.”

Sullivan argues that the US can use diplomacy and alliances to advocate for establishing privacy-protecting technical standards and norms in international bodies to persuade other nations have an alternative to embracing Chinese technology.

This process is already underway following President Biden's recent Executive Order to increase government monitoring of the digital supply chain and connected devices, as well as the user data those devices collect. 

The Order states, “Connected software applications are designed to be used on an end-point computing device and include the ability to collect, process, or transmit data via the Internet as an integral functionality... Connected software applications can access and capture vast swaths of information from users, including personal information and proprietary business information... Such data collection threatens to provide foreign adversaries with access to that information, which in turn presents a significant threat to US national security.”

NSCAI:      DefenseOne:      Torres Trade Law:     Govt. of Australia:

You Might Also Read: 

China Plans For Supremacy In AI & Quantum Computing:

 

« Security Orchestration Can Help Business SOAR
Power Generation Systems Need Blockchain Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZDL Group

ZDL Group

At ZDL (formerly ZeroDayLab) we take a comprehensive view of our clients cyber security risks and provide quality services to address those risk

IT GRC Forum

IT GRC Forum

The IT GRC Forum is an online resource and networking platform for the Governance, Risk Management, and Compliance (GRC) community

International Association of Professional Security Consultants (IAPSC)

International Association of Professional Security Consultants (IAPSC)

Members of the IAPSC represent a unique group of respected, ethical and competent security consultants.

Odix

Odix

Odix security software neutralizes file embedded targeted cyber attacks before they enter your organization’s network.

Blaze Information Security

Blaze Information Security

Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.

Westminster Insight - Cyber Security Conference

Westminster Insight - Cyber Security Conference

Join colleagues this December for Westminster Insight’s Cyber Security Conference, as you’ll assess how new technologies such as AI can secure your organisation against future threats.

DataNumen

DataNumen

The fundamental mission of DataNumen is to recover as much data from inadvertent data disasters as possible.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

InfoSec Conferences

InfoSec Conferences

InfoSec Conferences is an online directory of infosec conferences. We list every single Information Security conference, event and seminar within every niche in Cybersecurity.

CloudBolt Software

CloudBolt Software

CloudBolt provide solutions for your toughest cloud challenges. From automation, to cost and security, and hybrid IT governance — we have you covered.

CWSI

CWSI

CWSI provide a full suite of enterprise mobility, security and productivity solutions to many of Ireland and the UK’s most respected organisations across a wide range of industry and public sectors.

SIA Group

SIA Group

SIA Group, an Indra company, combines Consulting, Systems Integration and Managed Services in four specialized business areas: Information Security, Storage, IT Management and IT Mobility.

PSafe

PSafe

PSafe is a leading provider of mobile privacy, security, and performance apps. We deliver innovative products that protect your freedom to safely connect, share, play, express and explore online.

Dataships

Dataships

We help companies automate their privacy compliance while building healthy, transparent data relationships with their customers.

LogicGate

LogicGate

The LogicGate Risk Cloud™ is an agile GRC cloud solution that combines powerful functionality with intuitive design to enhance enterprise GRC programs.

Wadilona Cyber Securities

Wadilona Cyber Securities

Wadilona Cyber Securities' sole aim is to bring and secure Information and Communications Technology (ICT) to and work for humans in its simplest terms.