SlideShare a Scribd company logo
1/3
Digital Ethical
Risk Assessment
Cost effective review of ethical risks resulting from
largescale data collection and deployment of digital
solutions.
Service overview
Organizations are often being investigated by regulators and
can be the objects of lawsuits for mishandling personal data.
At the same time, they are deploying and developing artificial
intelligence (AI) as part of digital transformations to survive and
remain competitive. The result is increased reputational, legal,
and regulatory risks. The regulatory environment for digital
information is evolving and organizations should implement
risk-based governance processes that focus on digital ethics in
preparation for increased regulation of data collection, storage
and use.
A Capgemini report found that 70% of customers expect organizations to provide AI
interactions that are transparent and fair.1
Important questions to be considered:
•	 How much time and resources does it take to respond to a regulatory investigation?
•	 How many millions of dollars are spent paying a fine if found guilty or negligent of
violating regulations and laws?
•	 How many hundreds of millions of dollars does an organization needs to rebuild trust?
•	 How to attract sought-after talent that takes ethics seriously?
Identify digital
ethical risks and
sources
Prioritize risk
mitigation tactics
Get
recommendations
for efficient
adoption of
strategies
1
https://www.capgemini.com/news/ai-and-ethics-2020-report
2/3
Digital Ethical Risk Assessment
OpenText’s Digital Ethical Risk Assessment systematically and exhaustively addresses
ethical risks that can lead to regulatory investigations and fines, lawsuits, and a damaged
brand. Areas to be explored in this service include evaluating the following risk categories,
all of which define key elements of a robust digital ethical risk program.
Identify digital ethical risks and sources
Potential ethical threats range from physical and mental harm to denying services such as
loans and mortgages to those deserving of them, to gathering people’s personal data and
using it in ways to which they did not consent to deploying discriminatory machine learning
algorithms. A company that is not organizationally aware of these compounding risks and
where they come from, cannot address them.
Prioritize risk mitigation tactics
Some ethical risks are greater than others. It is important not only that organizations under-
stand what their vulnerabilities are, but also which vulnerabilities risk near-term loss and
which risk great losses, and the intersection of those two categories so that appropriate
risk reduction measures can be taken immediately.
Be well-positioned to create a digital ethical risk program
Organizations need digital ethical risk programs to systematically and exhaustively identify and
mitigate their digital ethical risks. The program should not only cover IT, product developers,
and data scientists, but also HR, marketing, and more. Upon completion of this risk assessment
organizations are well positioned to take a systematic approach to protecting themselves
from losses arising from digital ethical risks.
While many organizations are struggling to define AI ethics let alone operationalize it,
OpenText has developed a clear methodology informed not only by those in cybersecurity
and governance, risk and compliance, but also by team members that have deep expertise
in ethics and digital ethics in particular. The OpenText teams have deep familiarity with, and
contribute to, the most cutting edge research and best practices in data and AI ethics. No
other organization has the experience in ethics combined with a cross-disciplinary approach.
Related services:
• Building and Implementing an AI Ethics Framework
• AI Ethics Advisory Services
• Privacy Capabilities Assessment
• GDPR Discovery and Analysis Service
Risk categories
Case study
A large retail organization with vast
amounts of data employed a large
team of data scientists and engineers.
There was a data governance program
in place, including a data governance
board, which owned the data risks of
the organization, including regulatory
and cyber risks. However, several ethical
challenges had presented themselves
and the board found themselves without
a way to structure or document their
deliberations and decisions.
OpenText worked with them to create
an AI Ethics framework that included
standards, methods of documentation,
an articulation of role-specific
responsibilities to maintain those
standards, and established KPIs to
track the scaling and sustainability of
the framework.
RISK CATEGORIES
AI ethics
guidelines and
leadership
Infrastructure
and process
Data
governance
Algorithm design
and selection
Transparency
Client and
partner buy-in
3/3Copyright © 2020 Open Text. All Rights Reserved. Trademarks owned by Open Text.
For more information, visit: https://www.opentext.com/about/copyright-information • (12/18/20)17057.EN
opentext.com/contact
A Digital Ethical Risk Assessment includes the following activities:
•	 Virtual meetings
•	 Reviewing relevant existing policies/procedures
•	 Individual interviews with key decision makers
•	 Focus groups with middle management
•	 Identifying internal and external stakeholders
•	 Recommendations on how existing OpenText solutions can be leveraged or integrated
For more information, please contact us at portfolioanalyticsPS@opentext.com
About OpenText
OpenText, The Information Company, enables organizations to gain insight through market
leading information management solutions, on-premises or in the cloud. For more informa-
tion about OpenText (NASDAQ: OTEX, TSX: OTEX) visit: opentext.com.
Connect with us:
•	 OpenText CEO Mark Barrenechea’s blog
•	 Twitter | LinkedIn
Twitter | LinkedIn
More information
	 Understanding the 		
	 ethics of AI
	 Four steps for drafting 		
	 an ethical data practices 	
	blueprint
	 A practical guide to
	 building ethical AI
	 NIST Privacy Framework 	
	 – a focus on the identify 		
	function

More Related Content

What's hot

Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren Li
DaneWarren
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
Maganathin Veeraragaloo
 
Cybersecurity Program Assessments
Cybersecurity Program AssessmentsCybersecurity Program Assessments
Cybersecurity Program AssessmentsJohn Anderson
 
Cisa 2013 ch5
Cisa 2013 ch5Cisa 2013 ch5
Cisa 2013 ch5
Aladdin Dandis
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
Andrew Byers
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
Tammy Clark
 
Module 2 information security risk management student slides ver 1.0
Module 2 information security risk management    student slides ver 1.0Module 2 information security risk management    student slides ver 1.0
Module 2 information security risk management student slides ver 1.0
Aladdin Dandis
 
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
XEventsHospitality
 
A Guide to Managed Security Services
A Guide to Managed Security ServicesA Guide to Managed Security Services
A Guide to Managed Security Services
Graham Mann
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
primeteacher32
 
Business case for enterprise continuity planning
Business case for enterprise continuity planningBusiness case for enterprise continuity planning
Business case for enterprise continuity planning
William Godwin
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & StrategyTony Hauxwell
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
Greenway Health
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data Security
Imperva
 
Building a security strategy?
Building a security strategy?Building a security strategy?
Building a security strategy?
Lori McInnes
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
Manning Information Security Strategy
Manning Information Security StrategyManning Information Security Strategy
Manning Information Security Strategy
Donald Tabone
 

What's hot (19)

Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren Li
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Cybersecurity Program Assessments
Cybersecurity Program AssessmentsCybersecurity Program Assessments
Cybersecurity Program Assessments
 
Cisa 2013 ch5
Cisa 2013 ch5Cisa 2013 ch5
Cisa 2013 ch5
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
 
Module 2 information security risk management student slides ver 1.0
Module 2 information security risk management    student slides ver 1.0Module 2 information security risk management    student slides ver 1.0
Module 2 information security risk management student slides ver 1.0
 
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
 
A Guide to Managed Security Services
A Guide to Managed Security ServicesA Guide to Managed Security Services
A Guide to Managed Security Services
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Business case for enterprise continuity planning
Business case for enterprise continuity planningBusiness case for enterprise continuity planning
Business case for enterprise continuity planning
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data Security
 
Building a security strategy?
Building a security strategy?Building a security strategy?
Building a security strategy?
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Manning Information Security Strategy
Manning Information Security StrategyManning Information Security Strategy
Manning Information Security Strategy
 

Similar to Digital Ethical Risk Assessment

#NFIM18 - Anna Felländer - Senior Advisor, The Boston Consulting Group
#NFIM18 - Anna Felländer - Senior Advisor, The Boston Consulting Group#NFIM18 - Anna Felländer - Senior Advisor, The Boston Consulting Group
#NFIM18 - Anna Felländer - Senior Advisor, The Boston Consulting Group
Minc
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
OnRamp
 
Building Ethical AI
Building Ethical AIBuilding Ethical AI
Building Ethical AI
Madhumita Mantri
 
Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)
Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)
Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)
University of Chicago Booth Big Data & Analytics Roundtable
 
BANKING INTELLIGENCE THROUGH ARTIFICIAL INTELLIGENCE
BANKING INTELLIGENCE THROUGH ARTIFICIAL  INTELLIGENCEBANKING INTELLIGENCE THROUGH ARTIFICIAL  INTELLIGENCE
BANKING INTELLIGENCE THROUGH ARTIFICIAL INTELLIGENCE
PARAMASIVANCHELLIAH
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law Firms
Jim Merrifield, IGP, CIP
 
Linked in misti_rs_1.0
Linked in misti_rs_1.0Linked in misti_rs_1.0
Linked in misti_rs_1.0
Vincent Toms
 
Role of AI Safety Institutes in Trustworthy AI.pdf
Role of AI Safety Institutes in Trustworthy AI.pdfRole of AI Safety Institutes in Trustworthy AI.pdf
Role of AI Safety Institutes in Trustworthy AI.pdf
Bob Marcus
 
Board matters quarterly – volume 3
Board matters quarterly – volume 3Board matters quarterly – volume 3
Board matters quarterly – volume 3
elithomas202
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Sirius
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
Accenture Technology
 
A Guide To IT Compliance Assessment And Management
A Guide To IT Compliance Assessment And ManagementA Guide To IT Compliance Assessment And Management
A Guide To IT Compliance Assessment And Management
Skillmine Technology Consulting
 
Three big questions about AI in financial services
Three big questions about AI in financial servicesThree big questions about AI in financial services
Three big questions about AI in financial services
White & Case
 
Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19 Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19
DVV Solutions Third Party Risk Management
 
Risk Product.pptx
Risk Product.pptxRisk Product.pptx
Risk Product.pptx
Lalith Kumar Vemali
 
yellowibm
yellowibmyellowibm
yellowibmKay Orr
 
Better business outcomes with Big Data Analytics
Better business outcomes with Big Data AnalyticsBetter business outcomes with Big Data Analytics
Better business outcomes with Big Data AnalyticsBillington K
 

Similar to Digital Ethical Risk Assessment (20)

#NFIM18 - Anna Felländer - Senior Advisor, The Boston Consulting Group
#NFIM18 - Anna Felländer - Senior Advisor, The Boston Consulting Group#NFIM18 - Anna Felländer - Senior Advisor, The Boston Consulting Group
#NFIM18 - Anna Felländer - Senior Advisor, The Boston Consulting Group
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
 
Building Ethical AI
Building Ethical AIBuilding Ethical AI
Building Ethical AI
 
Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)
Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)
Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)
 
BANKING INTELLIGENCE THROUGH ARTIFICIAL INTELLIGENCE
BANKING INTELLIGENCE THROUGH ARTIFICIAL  INTELLIGENCEBANKING INTELLIGENCE THROUGH ARTIFICIAL  INTELLIGENCE
BANKING INTELLIGENCE THROUGH ARTIFICIAL INTELLIGENCE
 
web-MINImag
web-MINImagweb-MINImag
web-MINImag
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law Firms
 
Linked in misti_rs_1.0
Linked in misti_rs_1.0Linked in misti_rs_1.0
Linked in misti_rs_1.0
 
Role of AI Safety Institutes in Trustworthy AI.pdf
Role of AI Safety Institutes in Trustworthy AI.pdfRole of AI Safety Institutes in Trustworthy AI.pdf
Role of AI Safety Institutes in Trustworthy AI.pdf
 
Board matters quarterly – volume 3
Board matters quarterly – volume 3Board matters quarterly – volume 3
Board matters quarterly – volume 3
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
 
A Guide To IT Compliance Assessment And Management
A Guide To IT Compliance Assessment And ManagementA Guide To IT Compliance Assessment And Management
A Guide To IT Compliance Assessment And Management
 
Three big questions about AI in financial services
Three big questions about AI in financial servicesThree big questions about AI in financial services
Three big questions about AI in financial services
 
Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19 Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19
 
Risk Product.pptx
Risk Product.pptxRisk Product.pptx
Risk Product.pptx
 
yellowibm
yellowibmyellowibm
yellowibm
 
yellowibm
yellowibmyellowibm
yellowibm
 
Better business outcomes with Big Data Analytics
Better business outcomes with Big Data AnalyticsBetter business outcomes with Big Data Analytics
Better business outcomes with Big Data Analytics
 
yellowibm
yellowibmyellowibm
yellowibm
 

More from Marc St-Pierre

Opentext Managed XDR paves the way for CyberResilience
Opentext Managed XDR paves the way for CyberResilienceOpentext Managed XDR paves the way for CyberResilience
Opentext Managed XDR paves the way for CyberResilience
Marc St-Pierre
 
OpenText Security Health Check Service
OpenText Security Health Check ServiceOpenText Security Health Check Service
OpenText Security Health Check Service
Marc St-Pierre
 
OpenText Cybersecurity Tabletop Exercise
OpenText Cybersecurity Tabletop ExerciseOpenText Cybersecurity Tabletop Exercise
OpenText Cybersecurity Tabletop Exercise
Marc St-Pierre
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
Marc St-Pierre
 
OpenText Cyber Resilience Program
OpenText Cyber Resilience ProgramOpenText Cyber Resilience Program
OpenText Cyber Resilience Program
Marc St-Pierre
 
MITRE ATT&CK framework and Managed XDR Position Paper
MITRE ATT&CK framework and Managed XDR Position PaperMITRE ATT&CK framework and Managed XDR Position Paper
MITRE ATT&CK framework and Managed XDR Position Paper
Marc St-Pierre
 
OpenText AI & Analytics Services and Solutions Catalog
OpenText AI & Analytics Services and Solutions CatalogOpenText AI & Analytics Services and Solutions Catalog
OpenText AI & Analytics Services and Solutions Catalog
Marc St-Pierre
 
OpenText Threat Hunting Service
OpenText Threat Hunting ServiceOpenText Threat Hunting Service
OpenText Threat Hunting Service
Marc St-Pierre
 
The Incident Response Decision Tree
The Incident Response Decision TreeThe Incident Response Decision Tree
The Incident Response Decision Tree
Marc St-Pierre
 
US Medical University trust OpenText to guard against cyber threats-en.pdf
US Medical University trust OpenText to guard against cyber threats-en.pdfUS Medical University trust OpenText to guard against cyber threats-en.pdf
US Medical University trust OpenText to guard against cyber threats-en.pdf
Marc St-Pierre
 
OpenText Managed Extended Detection and Response (MxDR)
OpenText Managed Extended Detection and Response (MxDR)OpenText Managed Extended Detection and Response (MxDR)
OpenText Managed Extended Detection and Response (MxDR)
Marc St-Pierre
 
Managed Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperManaged Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) Whitepaper
Marc St-Pierre
 
Opentext Translation and Localization Services
Opentext Translation and Localization ServicesOpentext Translation and Localization Services
Opentext Translation and Localization Services
Marc St-Pierre
 
OpenText Translation & Localization Services
OpenText Translation & Localization ServicesOpenText Translation & Localization Services
OpenText Translation & Localization Services
Marc St-Pierre
 
Opentext Decisiv
Opentext DecisivOpentext Decisiv
Opentext Decisiv
Marc St-Pierre
 
OpenText Taxonomy Catalog & Services
OpenText Taxonomy Catalog & ServicesOpenText Taxonomy Catalog & Services
OpenText Taxonomy Catalog & Services
Marc St-Pierre
 
Open text security services catalog
Open text security services catalogOpen text security services catalog
Open text security services catalog
Marc St-Pierre
 
OpenText Legal Technology Solutions
OpenText Legal Technology SolutionsOpenText Legal Technology Solutions
OpenText Legal Technology Solutions
Marc St-Pierre
 
Smart migration Solution overview
Smart migration Solution overviewSmart migration Solution overview
Smart migration Solution overview
Marc St-Pierre
 
Idea to Insight
Idea to InsightIdea to Insight
Idea to Insight
Marc St-Pierre
 

More from Marc St-Pierre (20)

Opentext Managed XDR paves the way for CyberResilience
Opentext Managed XDR paves the way for CyberResilienceOpentext Managed XDR paves the way for CyberResilience
Opentext Managed XDR paves the way for CyberResilience
 
OpenText Security Health Check Service
OpenText Security Health Check ServiceOpenText Security Health Check Service
OpenText Security Health Check Service
 
OpenText Cybersecurity Tabletop Exercise
OpenText Cybersecurity Tabletop ExerciseOpenText Cybersecurity Tabletop Exercise
OpenText Cybersecurity Tabletop Exercise
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
OpenText Cyber Resilience Program
OpenText Cyber Resilience ProgramOpenText Cyber Resilience Program
OpenText Cyber Resilience Program
 
MITRE ATT&CK framework and Managed XDR Position Paper
MITRE ATT&CK framework and Managed XDR Position PaperMITRE ATT&CK framework and Managed XDR Position Paper
MITRE ATT&CK framework and Managed XDR Position Paper
 
OpenText AI & Analytics Services and Solutions Catalog
OpenText AI & Analytics Services and Solutions CatalogOpenText AI & Analytics Services and Solutions Catalog
OpenText AI & Analytics Services and Solutions Catalog
 
OpenText Threat Hunting Service
OpenText Threat Hunting ServiceOpenText Threat Hunting Service
OpenText Threat Hunting Service
 
The Incident Response Decision Tree
The Incident Response Decision TreeThe Incident Response Decision Tree
The Incident Response Decision Tree
 
US Medical University trust OpenText to guard against cyber threats-en.pdf
US Medical University trust OpenText to guard against cyber threats-en.pdfUS Medical University trust OpenText to guard against cyber threats-en.pdf
US Medical University trust OpenText to guard against cyber threats-en.pdf
 
OpenText Managed Extended Detection and Response (MxDR)
OpenText Managed Extended Detection and Response (MxDR)OpenText Managed Extended Detection and Response (MxDR)
OpenText Managed Extended Detection and Response (MxDR)
 
Managed Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperManaged Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) Whitepaper
 
Opentext Translation and Localization Services
Opentext Translation and Localization ServicesOpentext Translation and Localization Services
Opentext Translation and Localization Services
 
OpenText Translation & Localization Services
OpenText Translation & Localization ServicesOpenText Translation & Localization Services
OpenText Translation & Localization Services
 
Opentext Decisiv
Opentext DecisivOpentext Decisiv
Opentext Decisiv
 
OpenText Taxonomy Catalog & Services
OpenText Taxonomy Catalog & ServicesOpenText Taxonomy Catalog & Services
OpenText Taxonomy Catalog & Services
 
Open text security services catalog
Open text security services catalogOpen text security services catalog
Open text security services catalog
 
OpenText Legal Technology Solutions
OpenText Legal Technology SolutionsOpenText Legal Technology Solutions
OpenText Legal Technology Solutions
 
Smart migration Solution overview
Smart migration Solution overviewSmart migration Solution overview
Smart migration Solution overview
 
Idea to Insight
Idea to InsightIdea to Insight
Idea to Insight
 

Digital Ethical Risk Assessment

  • 1. 1/3 Digital Ethical Risk Assessment Cost effective review of ethical risks resulting from largescale data collection and deployment of digital solutions. Service overview Organizations are often being investigated by regulators and can be the objects of lawsuits for mishandling personal data. At the same time, they are deploying and developing artificial intelligence (AI) as part of digital transformations to survive and remain competitive. The result is increased reputational, legal, and regulatory risks. The regulatory environment for digital information is evolving and organizations should implement risk-based governance processes that focus on digital ethics in preparation for increased regulation of data collection, storage and use. A Capgemini report found that 70% of customers expect organizations to provide AI interactions that are transparent and fair.1 Important questions to be considered: • How much time and resources does it take to respond to a regulatory investigation? • How many millions of dollars are spent paying a fine if found guilty or negligent of violating regulations and laws? • How many hundreds of millions of dollars does an organization needs to rebuild trust? • How to attract sought-after talent that takes ethics seriously? Identify digital ethical risks and sources Prioritize risk mitigation tactics Get recommendations for efficient adoption of strategies 1 https://www.capgemini.com/news/ai-and-ethics-2020-report
  • 2. 2/3 Digital Ethical Risk Assessment OpenText’s Digital Ethical Risk Assessment systematically and exhaustively addresses ethical risks that can lead to regulatory investigations and fines, lawsuits, and a damaged brand. Areas to be explored in this service include evaluating the following risk categories, all of which define key elements of a robust digital ethical risk program. Identify digital ethical risks and sources Potential ethical threats range from physical and mental harm to denying services such as loans and mortgages to those deserving of them, to gathering people’s personal data and using it in ways to which they did not consent to deploying discriminatory machine learning algorithms. A company that is not organizationally aware of these compounding risks and where they come from, cannot address them. Prioritize risk mitigation tactics Some ethical risks are greater than others. It is important not only that organizations under- stand what their vulnerabilities are, but also which vulnerabilities risk near-term loss and which risk great losses, and the intersection of those two categories so that appropriate risk reduction measures can be taken immediately. Be well-positioned to create a digital ethical risk program Organizations need digital ethical risk programs to systematically and exhaustively identify and mitigate their digital ethical risks. The program should not only cover IT, product developers, and data scientists, but also HR, marketing, and more. Upon completion of this risk assessment organizations are well positioned to take a systematic approach to protecting themselves from losses arising from digital ethical risks. While many organizations are struggling to define AI ethics let alone operationalize it, OpenText has developed a clear methodology informed not only by those in cybersecurity and governance, risk and compliance, but also by team members that have deep expertise in ethics and digital ethics in particular. The OpenText teams have deep familiarity with, and contribute to, the most cutting edge research and best practices in data and AI ethics. No other organization has the experience in ethics combined with a cross-disciplinary approach. Related services: • Building and Implementing an AI Ethics Framework • AI Ethics Advisory Services • Privacy Capabilities Assessment • GDPR Discovery and Analysis Service Risk categories Case study A large retail organization with vast amounts of data employed a large team of data scientists and engineers. There was a data governance program in place, including a data governance board, which owned the data risks of the organization, including regulatory and cyber risks. However, several ethical challenges had presented themselves and the board found themselves without a way to structure or document their deliberations and decisions. OpenText worked with them to create an AI Ethics framework that included standards, methods of documentation, an articulation of role-specific responsibilities to maintain those standards, and established KPIs to track the scaling and sustainability of the framework. RISK CATEGORIES AI ethics guidelines and leadership Infrastructure and process Data governance Algorithm design and selection Transparency Client and partner buy-in
  • 3. 3/3Copyright © 2020 Open Text. All Rights Reserved. Trademarks owned by Open Text. For more information, visit: https://www.opentext.com/about/copyright-information • (12/18/20)17057.EN opentext.com/contact A Digital Ethical Risk Assessment includes the following activities: • Virtual meetings • Reviewing relevant existing policies/procedures • Individual interviews with key decision makers • Focus groups with middle management • Identifying internal and external stakeholders • Recommendations on how existing OpenText solutions can be leveraged or integrated For more information, please contact us at portfolioanalyticsPS@opentext.com About OpenText OpenText, The Information Company, enables organizations to gain insight through market leading information management solutions, on-premises or in the cloud. For more informa- tion about OpenText (NASDAQ: OTEX, TSX: OTEX) visit: opentext.com. Connect with us: • OpenText CEO Mark Barrenechea’s blog • Twitter | LinkedIn Twitter | LinkedIn More information Understanding the ethics of AI Four steps for drafting an ethical data practices blueprint A practical guide to building ethical AI NIST Privacy Framework – a focus on the identify function