Employees Hired & Fired By Algorithm

The rising prominence of  Artificial Intelligence (AI) in the workplace is challenging existing professional roles and skills. To date, AI algorithms have proven useful for handling large quantities of data and image processing, but recent advances have made it possible to create AI systems that interact with humans. Indeed, many firms already use an automated system with no human oversight in the first stage of the hiring process, to narrow the field. 
 
AI software is now used in the initial recruitment processes of a number of multinational companies, including McDonald's, JP Morgan, PWC, and Kraft Heinz. Only after the initial AI - driven selection process will there be any personal contact involving a human recruiter. 
 
“We stand on the brink of a technological revolution that will fundamentally alter the way we live, work, and relate to one another... In its scale, scope, and complexity, the transformation will be unlike anything humankind has experienced before.,” according to the British Trade Union Congress (TUC)
 
Many workplaces already use automated decision making for simple tasks. For example, Uber assigns driving jobs to its drivers automatically, by computer, and Amazon is known to use AI monitoring systems to watch its staff in its  warehouses. One provider of AI recruitment software is HireVue which offers an AI system that records videos of job applicants answering interview questions via their laptop. 

 

But as AI becomes more sophisticated, the fear is that it will be entrusted with more serious, high-risk decisions, such as analysing those performance metrics to figure out who should be first in line for promotion, or being dismissed. That can happen even when a human is involved, a TUC report warns, thanks to automated decision making. 

The TUC is saying that workers could be “hired and fired by algorithm” and new legal protections were needed, waring of “huge gaps” in UK employment law over the use of AI in the workplace.

Among changes the TUC is calling for is a legal right to have any “high-risk” decision reviewed by a human. TUC general secretary Frances O’Grady said the use of AI at work stood at “a fork in the road... AI at work could be used to improve productivity and working lives. But it is already being used to make life-changing decisions about people at work - like who gets hired and fired. Without fair rules, the use of AI at work could lead to widespread discrimination and unfair treatment – especially for those in insecure work and the gig economy,” she said.
 
The TUC’s report, written with the aid of employment rights lawyers and the AI Law Consultancy, argues that the law has failed to stay abreast of quick progress in AI in recent years. The Report is split into three parts:
 
  • An outline of  the nature of new AI technologies deployed in the workplace and the applicable legal framework before setting out “red lines”beyond which AI systems should not be used.
  • An assessment based on case studies of the effectiveness of current legal frameworks to control and protects workers from the use of AI in the workplace.
  • Specifiic recommendations that should underpin the future actions of legislators, regulators and the trade union movement. 
The TUC is calling for Changes to UK law to protect against discrimination by algorithm. In particular:   
 
  • The legal right to have a human review decisions.
  • An obligation on employers to consult unions on the use of “high risk” or “intrusive” AI at work,
  • A  legal right to “switch off” from work and not be expected to answer calls or emails
The TUC claim that discrimination by algorithm has been well-documented in recent years, often as an unintentional side-effect of using systems that fail to account for racial bias. “AI is progressively gaining the ability to perform tasks typically carried out by humans and stresses, therefore, the need to establish adequate safeguards, including design systems with human-in-the-loop control and review processes, transparency, accountability and verification of AI decision-making …” it , concludes. 
 
TUC:    AI-Lawhub:     Financial Times:      BBC:      The Burn-In:     Stirling University:    BBC:   Personnel Today:
 
 
You Might Also Read:
 
Artificial Intelligence : A Quick Overview:
 
 
« New Digital Qualifications For The British Workforce
The European Union Adopts A Cyber Security Strategy »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

Huntsman Security

Huntsman Security

Huntsman Security provides technology to enable real-time security monitoring and immediate visibility of advanced threats and compliance issues.

BlackBerry Cybersecurity

BlackBerry Cybersecurity

Blackberry provides intelligent security software and services to enterprises and governments around the world.

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

OGCIO supports the development of community-wide information technology infrastructure and setting of technical and professional standards to strengthen Hong Kong’s position as a world digital city.

TES

TES

TES is a provider of IT Lifecycle Services, offering bespoke solutions that help customers manage the commissioning, deployment and retirement of Information Technology assets.

Integrity

Integrity

Integrity is a PCI QSA and ISO 27001 certified company specialized in Information Security and IT Consulting.

FortifyIQ

FortifyIQ

FortifyIQ's mission is to advance maximum security against side-channel attacks across the entire computing spectrum.

D2 Network Associates (D2NA)

D2 Network Associates (D2NA)

D2NA help businesses deliver and achieve their goals, through innovative IT solutions, robust cyber security services and proactive IT managed services.

OnSecurity

OnSecurity

OnSecurity replaces the overhead of traditional penetration testing firms with a simple online interface, making it easy to book tests as and when needed.

Luta Security

Luta Security

Luta Security implements a holistic approach to advance the security maturity of governments and organizations around the world.

Skyhawk Security

Skyhawk Security

Skyhawk Security is the originator of Cloud threat Detection and Response (CDR), helping hundreds of users map and remediate sophisticated threats to cloud infrastructure in minutes.

Anjuna Security

Anjuna Security

Software from Anjuna Security effortlessly enables enterprises to safely run even their most sensitive workloads in the public cloud.

NORMA Cyber

NORMA Cyber

NORMA Cyber delivers centralised cyber security services to Norwegian shipowners and other entities within the Norwegian maritime sector.

Turngate

Turngate

Turngate simplify security investigations so you can see employee activities and entitlements in your enterprise in seconds.

MODUS X

MODUS X

MODUS X is a Ukrainian IT product and service company created from the IT department of the DTEK Group of Companies.

Cyberscope

Cyberscope

Cyberscope is a Web3 security firm specializing in smart contract audits, crypto security audits, and blockchain vulnerability assessments.