Page 41 - Third Issue
P. 41

To protect the identification of    people based on characteristics     quantity of personal information you
        specific individuals, aggregation   that shouldn’t matter, including    share on social media sites and other
        combines data at the individual level   gender, color, religion, or political   websites because it may be used to
        into bigger groups. Generalization   inclinations.                      defraud you or steal your identity.
        entails substituting particular
        values for more general ones, for as   Likewise, there are significant   Recognize and manage privacy
        substituting ages for age ranges.   worries regarding how and by        settings: Learn about the privacy
                                            whom this data might be used as     options available on the platforms
        Whilst de-identification and        a result of AI’s capacity to observe   and services you use. Change these
        anonymization can aid in the        and follow people’s behavior. Data   settings to restrict the gathering and
        protection of privacy in AI         might, for instance, be used to sway   sharing of your data, and if you can,
        applications, they are not perfect.   voters’ opinions during election   think about choosing not to receive
        Through the use of cross-referencing   campaigns, possibly compromising   targeted advertising.
        anonymized data with publicly       the democratic process. The Value of
        accessible data sources, it is still   Privacy in the AI Era A basic human   Be Alert for Phishing Attacks: Be
        feasible to re-identify certain     right is the right to privacy. It makes   wary of emails, messages, or phone
        people. Additionally, even from     it possible for people to have control   calls requesting private information
        partially anonymized data sets,     over their personal information     from you or directing you to click on
        skilled attackers employing machine   and to block unauthorized access   dubious links. Before sending any
        learning techniques can still identify   to it. The emergence of AI poses   personal information, make sure
        personal information.               a completely new threat to data     the request is legitimate. You should
                                            security and privacy. Massive       also refrain from clicking on shady
        To ensure that personal data cannot   volumes of data about people are   links or downloading anything from
        be re-identified, it is crucial to   gathered and analyzed by AI systems,  unfamiliar sources.
        combine several anonymization and   frequently without that people’s
        de-identification techniques and    awareness or consent. This poses a   Protect your domestic network:
        carefully analyze their performance.   serious risk to one’s privacy and may   Establish a strong password, enable
        To ensure that data stays anonymous  result in the exploitation of personal   network encryption (such as WPA2
        and de-identified over time, routine   information.                     or WPA3), and frequently update the
        audits and updates must also be                                         software on your router to make sure
        carried out.                                                            your home Wi-Fi network is safe.
        In broad terms, anonymization       In the era of AI, maintaining security
        and de-identification methods are   is essential for safeguarding your   Make use of secure Wi-Fi networks:
        essential for preserving individual   private data and keeping your online   Be cautious when connecting to
        privacy in AI applications. Despite   identity private. Here are some   public Wi-Fi networks when using
        their shortcomings, they can greatly   crucial security procedures:     the internet away from home.
        lower the risk of data breaches                                         To encrypt your internet traffic
        and privacy violations when used    Frequently update your software,    and shield your data from any
        in conjunction with other privacy-  programs, and hardware with the     eavesdropping, use virtual private
        preserving techniques and vigilant   most recent security patches and   network (VPN) services.
    “                                       security of your systems and helps   Create regular backups of your
                                            firmware updates. This improves the
        monitoring.
        The Impact of AI on Privacy and
                                            guard against known vulnerabilities.
                                                                                vital data and keep them secure by
        Personal Data
                                                                                doing regular backups of your data.
                                                                                hardware failure, theft, and other
                                            Don’t use the same password on
        AI systems’ acquisition of personal   Use Strong and Unique Passwords:   This safeguards your data against
        data poses serious risks to data    different platforms. Instead, use   unanticipated circumstances.
        security and privacy. It is extremely   strong, unique passwords for each of
        concerning that hackers and         your accounts. To save and manage   Stay Up to Date: Keep up with the
        other cybercriminals could have     your credentials safely, think about   most recent developments, threats,
        unauthorized access to the personal   using a password manager.         and best security practices. Maintain
        data that AI systems store. Similarly,   Turn on two-factor authentication   a regular awareness of new security
        to this data breaches happen when   (2FA) whenever you can. Requiring   dangers, and take the appropriate
        businesses neglect to protect their   a second form of verification in   actions to adapt and safeguard your
        customers’ data, endangering their   addition to your password, such as a   online presence.
        right to privacy. Therefore, protecting  code delivered to your phone, offers
        data privacy is crucial while using AI   an additional layer of protection.  You can improve your security in the
        systems. Additionally, AI can profile                                   age of AI and better safeguard your
        people based on the data gathered,   Take Personal Information Carefully:   data and privacy online by adhering
        which may result in discrimination.   Be cautious when sharing personal   to these best practices.
        It becomes simple to group          information online. Reduce the
                                              ICT NEPAL (Issue-3, 2023)                                     41
   36   37   38   39   40   41   42   43   44   45   46