您的浏览器禁用了JavaScript(一种计算机语言,用以实现您与网页的交互),请解除该禁用,或者联系我们。[EDPB]:人工智能和数据保护培训课程:使用个人数据的安全AI系统基础知识 - 发现报告

人工智能和数据保护培训课程:使用个人数据的安全AI系统基础知识

2025-08-22-EDPB米***
AI智能总结
查看更多
人工智能和数据保护培训课程:使用个人数据的安全AI系统基础知识

Training curriculum on AI and data protectionFundamentals of Secure AI Systemswith Personal Data by Dr. Enrico GLEREAN As part of the SPE programme, the EDPB may commission contractors to provide reports andtools on specific topics. The views expressed in the deliverables are those of their authors and they do notnecessarily reflect the official position of the EDPB. The EDPB does not guarantee theaccuracy of the information included in the deliverables. Neither the EDPB nor any personacting on the EDPB’s behalf may be held responsible for any use that may be made of theinformation contained in the deliverables. Some excerpts may be redacted or removed from the deliverables as their publication wouldundermine the protection of legitimate interests, including, inter alia, the privacy andintegrity of an individual regarding the protection of personal data in accordance withRegulation (EU) 2018/1725 and/or the commercial interests of a natural or legal person. Table of contents Preface ...................................................................................................................................... 6License ................................................................................................................................... 6Introduction ............................................................................................................................... 7What is this book about?........................................................................................................ 7Who is this book for?.............................................................................................................. 7Book structure........................................................................................................................ 7Further considerations ........................................................................................................... 7Notice on the tools used for writing this book ....................................................................... 7Contributing to the book ........................................................................................................ 81. Elements of Artificial Intelligence, Data Protection, Cybersecurity ...................................... 91.1 What is Artificial Intelligence?.......................................................................................... 91.2 What is personal data? .................................................................................................. 151.3 What is Cybersecurity? .................................................................................................. 191.4 Summary........................................................................................................................ 211.5 Exercises ........................................................................................................................ 222. AI and Privacy: Ethics, risks, laws ....................................................................................... 262.1 AI and ethics .................................................................................................................. 262.2 Privacy and Ethics.......................................................................................................... 282.3 Risk assessment in AI and in Privacy............................................................................. 292.4 AI, Privacy, and law........................................................................................................ 332.5 Summary........................................................................................................................ 383. The AI development lifecycle and cybersecurity ................................................................ 403.1 The AI lifecycle ............................................................................................................... 403.2 Mapping the AI lifecycle to MLops ................................................................................. 413.3 The components of secure AI development and deployment ....................................... 423.4 Cybersecurity threats and the AI lifecycle..................................................................... 443.5 Other relevant standards............................................................................................... 463.6 Summary........................................................................................................................ 474. Personal data management in AI systems in practice........................................................ 494.1 Forming the “Raw Data”................................................................................................ 504.2 Pre-processed data ........................................................................................................ 534.3 Data analysis stage: feat