In a modern healthcare setting, the stethoscope and the blood pressure cuff aren’t the only…
Read More
The European Parliament has adopted a resolution calling for a ban on the use of AI-based predictive policing systems and the processing of biometric data that leads to mass surveillance.
Areas
The resolution seeks to ban the use of facial recognition technology and AI in several key areas:
– Police use of facial recognition technology in public places.
– Private facial recognition databases (e.g. Clearview AI)
– Predictive policing and social scoring systems.
What Is Clearwater AI?
Clearwater AI is a US-based facial-recognition company started by Australian Hoan Ton-That and a former aide of ex-New York City Mayor Rudy Giuliani. The AI-software system, which is used by hundreds of law enforcement agencies, has been criticised for using a database that includes billions of photos scraped from social media websites (possibly in violation of social media platform rules). Concerns have also been voiced that, like other systems, it may have a racial bias.
What Is Predictive Policing?
So-called ‘predictive policing’ tools use algorithms and historic data to predict where certain types of crime (e.g. burglaries and street violence) are likely to occur and to predict the likelihood of known individuals exhibiting certain behaviours or characteristics in the future.
What Are Social Scoring Systems?
An example of a social scoring system can be found in China where the Chinese Communist Party operates a “social credit system” for individuals and organisations. A person’s/organisation’s social score can move up and down depending on their behaviour. Bad behavior, for example, could include questionable shopping habits, buying too many video games, bad driving, posting on social media, or smoking in non-smoking zones. It has been reported that bad behaviour online, for example, could lead to the punishment of throttling a person’s Internet speed.
What Happens Now?
The European Parliament resolution gives an overview of the argument and indicates the way that voting may go for what will become the AI Act. It is thought that since the AI Act’s lead negotiator, Brando Benifei, and co-negotiators are known to support a blanket ban on facial recognition, there is a strong chance that AI in criminal law and its usage by the police and judicial authorities in criminal matters will have bans and regulations in place soon in the EU.
What Does This Mean For Your Business?
The case for AI-based facial recognition systems being used in mass surveillance and predictive policing is supposed to help tackle crime in an intelligent, targeted way. The reality (to date) however, has been cases of misidentification, examples of racial bias, strong resistance from freedom groups on matters of privacy, questions about value for money, and questions about ethics. Also, there is a strong feeling that the use and rollout of this technology has happened before the issues have been studied properly and legislation/regulations put in place to offer protection to citizens. Allegations about how Clearwater AI’s database was scraped from social media, as well as worries about the idea of predictive policing and big brother-like social-scoring-systems have all been factors in prompting the need to slow things down and get some rules in place.
About Us
J700 Group are a Lancashire-based, family-run, professional and responsive, Managed Solutions Provider helping Businesses, the Education Sector, and the Healthcare Sector to utilise Innovative IT Consultancy Services, Cloud Solutions, Cyber Security, Microsoft 365, Telecoms, Web Design and SEO solutions to propel their organisation to the next level and beyond.
As an experienced IT Support Provider, helping businesses across Lancashire & Manchester, if you need any assistance with your IT including IT Hardware, a Disaster Recovery Policy or Managed Backup Solutions; Contact us today to see how we can help your business.
#tech #technews #technology #j700group #biztips #b2b #sme #lancashire #itsupport #ai #facialrecognition
When people hear the word cybersecurity, they often imagine complex systems, expensive software and specialist…
Read MoreAs we count down to midnight, most of us are thinking about gym memberships or…
Read MoreIt’s Christmas Eve in Lancashire. The Preston bypass is a nightmare, the last-minute dash to…
Read MoreFor many businesses, the Christmas period means quieter offices, reduced staffing and systems left running…
Read MoreOr: Why we’d like to have a word with Tim Cook this Christmas. There are…
Read MoreHackers Love Christmas: Learn Why your Business Could be at Risk This Holiday SeasonThe festive…
Read MoreIn recent months, high-profile companies like Land Rover and Co-op have made headlines due to…
Read MoreExplore 7 essential tips for effective cloud solutions comparison to find the best fit for…
Read MoreLearn how to secure business data for UK SMEs with this step-by-step guide focused on…
Read MoreCybersecurity basics explained for UK businesses—core concepts, major threats, essential safeguards, and compliance requirements. A…
Read MoreDiscover the essential role of IT support desks, core functions, key benefits, types of support,…
Read MoreDiscover 10 microsoft 365 alternatives for UK SMEs, comparing features and benefits to help your…
Read MoreDiscover the best microsoft 365 alternatives in our comparison of 10 top products to enhance…
Read MoreDiscover a business connectivity checklist with 7 actionable steps to boost IT reliability, security, and…
Read MoreDiscover 7 essential business continuity planning steps to protect your SME. Learn practical strategies for…
Read MoreSmall Business Office 365 comprehensive guide for UK SMEs: core features, setup process, security essentials,…
Read MoreSmall Business Office 365 guide for UK firms. Learn core features, setup, security, costs, and…
Read MoreSmall business Office 365 guide covering essential features, security, costs, local support, and practical benefits…
Read MoreFollow this cybersecurity checklist for SMEs to secure your business in Lancashire and Manchester. Step-by-step…
Read MoreFollow this cybersecurity checklist for SMEs to boost protection, reduce risks, and secure business data…
Read MoreCloud security explained: A comprehensive guide for UK businesses covering threat types, protection strategies, compliance,…
Read MoreData protection strategies for UK SMEs—types, key components, GDPR compliance, business risks, and best practices…
Read MoreWhy cybersecurity matters for UK businesses: core concepts, main risks, common threats, legal requirements, and…
Read MoreComprehensive guide to IT issues Lancashire businesses face, including security threats, system downtime, cloud solutions,…
Read MoreComprehensive guide on cyber security threats in the UK. Learn common types, key characteristics, real-world…
Read MoreFollow this IT security checklist for a step-by-step process to secure your business effectively in…
Read MoreExplore the benefits of managed IT services for businesses in Manchester and Lancashire, enhancing efficiency…
Read MoreExplore the role of cybersecurity in business. Understand its importance, how it works, and key…
Read MoreDiscover 7 key advantages of Microsoft 365 for SMEs that can enhance productivity, collaboration, and…
Read MoreExplore why use managed IT services and how they benefit businesses. Gain comprehensive insights on…
Read MoreComprehensive guide explaining cyber threats, focusing on their importance, how they work, and the key…
Read MoreDiscover what is business continuity and why it matters for your business's resilience, sustainability, and…
Read MoreDiscover effective ways to secure business data through a step-by-step process, ensuring the safety and…
Read MoreDiscover 7 key advantages of Microsoft 365 that can enhance your business operations and productivity…
Read MoreExplore local IT services explained in detail, focusing on their importance and how they work…
Read MoreExplore cloud application hosting, its importance, how it operates, and the key concepts behind it…
Read MoreExplore why choose cloud solutions for your business. Discover how they work, their importance, and…
Read MoreExplore cyber security services for small business, their importance, and how they protect against online…
Read MoreFollow this IT support checklist for a systematic approach to IT maintenance. Ensure smooth operations…
Read More