SlideShare a Scribd company logo
1 of 5
Download to read offline
Inputted data to ChatGPT may be
used for unauthorized purposes
Faraidun Faraj
Chatbots and AI systems have become increasingly
popular for their ability to make daily tasks easier and
more efficient. However, it's important to be aware of
the risks involved when inputting personal data online,
as there is no guarantee of protection.
In today's digital age, there is always a risk of data
breaches, hacking, and unauthorized access.
Guaranteeing that your data will not be used for other
purposes is a challenging task, as it depends on the
specific implementation of the chatbot or AI system and
the policies of the organizationor companythat
provides it. Nevertheless, there are some steps you can
take to minimize the risk of your data being used for
unauthorized purposes:
1. Read the privacy policy and terms of service carefully
before interacting with the chatbot or AI system. This
can help you understand how your data will be used and
shared, and what steps are being taken to protect your
privacy. For example, if you are using a chatbot provided
by a healthcare company, make sure the privacy policy
outlines how your health information will be protected.
2. Avoid providing sensitive or personal information
unless absolutely necessary. Only provide information
that is required to receive a response or service from
the chatbot or AI system. For example, if you are using a
chatbot to order food, you only need to provide your
name and address. Avoid providing your social security
number or other sensitive information.
3. Use a secure and private connection when interacting
with the chatbot or AI system. Avoidusing public Wi-Fi
or unsecured networks, as these can increase the risk of
your data being intercepted or accessed by
unauthorized parties. For example, if you are using a
chatbot to access your bank account, make sure you are
using a secure and private internet connection.
4. Use a reputable and trusted chatbot or AI system.
Research the organizationor company providing the
chatbot or AI system, and look for reviews and feedback
from other users. For example, if you are using a chatbot
provided by a financial institution, make sure the
organizationhas a good reputation and positive
customer reviews.
5. Be aware of the data protection laws in your country
or region, and how they apply to the chatbot or AI
system you are using. When using a chatbot or AI
system, be aware of the data protection laws in your
country or region. Understand how these laws apply to
the chatbot or AI system you are using and what rights
you have as a user. For example, in the European Union,
the General Data Protection Regulation (GDPR) sets out
strict rules for how companies can collect, use, and
store personal data.
Ultimately, it's important to understand that there is no
foolproof way to guarantee that your data will not be
used for unauthorized purposes. However, by taking
these steps and being cautious about what information
you share, you can reduce the risk of your data being
misused.
It's also important to monitor your accounts and data
regularly to ensure that there are no unauthorized
accesses or activities. If you notice anything suspicious,
report it immediately to the relevant authorities or the
company providing the chatbot or AI system.
In summary, while chatbots and AI systems can make
our lives easier, we should always be aware of the
potential risks involved, particularly when it comes to
the protection of our personal data. By taking simple
precautions and being mindful of what information we
share, we can reduce the risk of our data being used for
unauthorized purposes.

More Related Content

Similar to Inputted data to ChatGPT may be used for unauthorized purposes

2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?Aparna Sharma
 
Where NOT to use ChatGPT.pdf
Where NOT to use ChatGPT.pdfWhere NOT to use ChatGPT.pdf
Where NOT to use ChatGPT.pdfAnshul Khandelwal
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityJamie Hutt
 
M6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityM6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityJamie Hutt
 
Auto Response System for Legal Consultation
Auto Response System for Legal ConsultationAuto Response System for Legal Consultation
Auto Response System for Legal Consultationijtsrd
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxsadia456189
 
Research Project Ms
Research Project MsResearch Project Ms
Research Project Msmafer23
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information securityUMaine
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyDMI
 
Legal, Ethical, Environmental, Economic and Social Implications
Legal, Ethical, Environmental, Economic and Social ImplicationsLegal, Ethical, Environmental, Economic and Social Implications
Legal, Ethical, Environmental, Economic and Social ImplicationsSabahtHussein
 
Google Health - NYHIMA
Google Health - NYHIMAGoogle Health - NYHIMA
Google Health - NYHIMARaj Goel
 

Similar to Inputted data to ChatGPT may be used for unauthorized purposes (15)

2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Fundraising On The Internet
Fundraising On The InternetFundraising On The Internet
Fundraising On The Internet
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?
 
Where NOT to use ChatGPT.pdf
Where NOT to use ChatGPT.pdfWhere NOT to use ChatGPT.pdf
Where NOT to use ChatGPT.pdf
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and Security
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
Ai book
Ai bookAi book
Ai book
 
M6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityM6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And Security
 
Auto Response System for Legal Consultation
Auto Response System for Legal ConsultationAuto Response System for Legal Consultation
Auto Response System for Legal Consultation
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
 
Research Project Ms
Research Project MsResearch Project Ms
Research Project Ms
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacy
 
Legal, Ethical, Environmental, Economic and Social Implications
Legal, Ethical, Environmental, Economic and Social ImplicationsLegal, Ethical, Environmental, Economic and Social Implications
Legal, Ethical, Environmental, Economic and Social Implications
 
Google Health - NYHIMA
Google Health - NYHIMAGoogle Health - NYHIMA
Google Health - NYHIMA
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Inputted data to ChatGPT may be used for unauthorized purposes

  • 1. Inputted data to ChatGPT may be used for unauthorized purposes Faraidun Faraj
  • 2. Chatbots and AI systems have become increasingly popular for their ability to make daily tasks easier and more efficient. However, it's important to be aware of the risks involved when inputting personal data online, as there is no guarantee of protection. In today's digital age, there is always a risk of data breaches, hacking, and unauthorized access. Guaranteeing that your data will not be used for other purposes is a challenging task, as it depends on the specific implementation of the chatbot or AI system and the policies of the organizationor companythat provides it. Nevertheless, there are some steps you can take to minimize the risk of your data being used for unauthorized purposes: 1. Read the privacy policy and terms of service carefully before interacting with the chatbot or AI system. This can help you understand how your data will be used and shared, and what steps are being taken to protect your privacy. For example, if you are using a chatbot provided by a healthcare company, make sure the privacy policy outlines how your health information will be protected.
  • 3. 2. Avoid providing sensitive or personal information unless absolutely necessary. Only provide information that is required to receive a response or service from the chatbot or AI system. For example, if you are using a chatbot to order food, you only need to provide your name and address. Avoid providing your social security number or other sensitive information. 3. Use a secure and private connection when interacting with the chatbot or AI system. Avoidusing public Wi-Fi or unsecured networks, as these can increase the risk of your data being intercepted or accessed by unauthorized parties. For example, if you are using a chatbot to access your bank account, make sure you are using a secure and private internet connection. 4. Use a reputable and trusted chatbot or AI system. Research the organizationor company providing the chatbot or AI system, and look for reviews and feedback from other users. For example, if you are using a chatbot provided by a financial institution, make sure the organizationhas a good reputation and positive customer reviews.
  • 4. 5. Be aware of the data protection laws in your country or region, and how they apply to the chatbot or AI system you are using. When using a chatbot or AI system, be aware of the data protection laws in your country or region. Understand how these laws apply to the chatbot or AI system you are using and what rights you have as a user. For example, in the European Union, the General Data Protection Regulation (GDPR) sets out strict rules for how companies can collect, use, and store personal data. Ultimately, it's important to understand that there is no foolproof way to guarantee that your data will not be used for unauthorized purposes. However, by taking these steps and being cautious about what information you share, you can reduce the risk of your data being misused. It's also important to monitor your accounts and data regularly to ensure that there are no unauthorized accesses or activities. If you notice anything suspicious, report it immediately to the relevant authorities or the company providing the chatbot or AI system.
  • 5. In summary, while chatbots and AI systems can make our lives easier, we should always be aware of the potential risks involved, particularly when it comes to the protection of our personal data. By taking simple precautions and being mindful of what information we share, we can reduce the risk of our data being used for unauthorized purposes.