In the case of societal security v. personal privacy

Fractal designed a solution that monitored and reported real-time social distance violations. A dashboard provided visualized analytics of KPIs, such as the number of infringements and the severity of each incident based on determined thresholds by location. We did additional solution development to incorporate the three fundamental principles of responsible AI implementation into the final design. After the challenge of each principle was outlined, a solution aligned with the ethical AI framework was developed. What we enabled Evidence that responsible AI adoption is not a far cry from its concept

PRIVACY

TRANSPARENCY

ACCOUNTABILITY

How should such an AI-enabled behavioral compliance system be moderated and be made audit ready?

How can we achieve accountability alongside a combination of technology, policy, and legal frameworks to ensure that privacy rights are protected and the systems are used responsibly and effectively? Unblurred images provided information on a need- to-know basis. As an individual was identified through unblurring, strict records needed to be kept for actualizing a chain of accountability.

How can we protect individual privacy while handling sensitive information to help law enforcement? Enable the categorization of objects while maintaining their privacy.

An AI surveillance system directly impacts society and its behavioral traits. The solution needed to operate with transparent guidelines and be auditable.

Accountability becomes paramount because access to sensitive information is restricted based on necessity. Each access was recorded and auditable based on parameters including, but not limited to:

Under public authority supervision, we successfully restricted the visibility and

Blurred detected objects on the video stream to deliver privacy. The object was masked and encrypted to protect its identity.

access control of the transparency view.

To ensure absolute trans- parency of the solution, only stakeholders with the correct authorization and encryption keys could unblur images and retrieve object identity.

• Accessor details • Accessed object details • Timestamp • Reason for process-access • Retention period-record

The verdict is in: There is no defense for unethical AI implementation

7

© 2022 Fractal Analytics Inc. All rights reserved

Made with FlippingBook - PDF hosting