SlideShare a Scribd company logo
Australia’s National Science Agency
International
Cooperation for
Research on
Privacy and Data
Protection
Australia’s Approach
Liming Zhu
Research Director, CSIRO’s Data61
Chair, Blockchain & Distributed Ledger
Technology, Standards Australia
ISO/IEC JTC 1/SC 42/WG 3 - Artificial intelligence –
Trustworthiness
CSIRO’s Data61: Australia’s Largest Data & Digital
Innovation R&D Organisation
1000+
talented people
(including
affiliates/students)
Home of
Australia’s
National AI
Centre
Data61
Generated
18+ Spin-outs
130+ Patent
groups
200+
Gov &
Corporate
partners
Facilities
Mixed-Reality Lab
Robotics Inno. Centre
AI4Cyber HPC Enclave
300+
PhD students
30+
University collaborators
Responsible
Tech/AI
Privacy & RegTech
Engineering & Design of
AI Systems
Resilient &
Recovery Tech
Cybersecurity
Digital Twin
Spark (bushfire) toolkit
2 |
§ More sources & types from public & partners
§ Inter-governmental/cross-border data flow
§ Access and use of sensitive data from another
organisation/country
§ Data analytics over encrypted data -
”sharing/use without access”
§ Foundation models and LLMs
§ Privacy and data security concerns
Trend: Value Arises from Data Sharing & Joint Analytics
Data sharing, Large-Language Models, Foundation Models
3 |
Sensitive Data
Trend: Regulation/Ethic Overlay
Data Economy: Balancing Innovation & Regulation Burden
Legislations and Standards
• Global: GDPR, EU AI Act, NIST AI RMF, ISO AI Standards
• Australia
• AU Privacy Act Review
• Security of Critical Infrastructure Act (SOCI) Amendments
• Consumer Data Right (CDR): Open Banking, Energy, Telcom
International Dynamics
• Data, Software and AI Supply Chains
• Data used in AI, Trustworthy data and AI
• Responsible AI – Trust Data/AI-powered Service
- Tradeoffs between Fairness/Transparency vs. Privacy/Security
- Right to be forgotten
4 |
• Human, societal and environmental wellbeing
• Human-centred values
• Fairness
• Privacy protection and security
• AU Privacy Act
• Data Breach Notification
• SOCI Amendments
• Reliability and safety
• Transparency and explainability
• Contestability
• Accountability
Australian AI Ethics Principles
Privacy and Data Protection is part of it
5 |
• Risk silos competing for resources
• Board risk committees: financial, legal, reputation
– + HSE + privacy + security + ethics + AI + ….
• Different stakeholder interests & complex landscape of risk
assessment
• Limited connections between risks assessed separately
• Risk mgt perceived as a barrier – a separate thing dreaded doing
• Preventing research collaboration
Industry Challenge: Competing risk silos
6 |
• Connecting risks with concrete trade-offs/mitigations
– Privacy + Data Protection + AI Risks + other risks
• Closing the Gaps between privacy/protection principles & algorithms
– Algorithm-level approaches (like DP) are good starts
– System-level views and engineering practices are next
• Forming an international research alliance
– National-level research connections
– Coordinate on (de-facto) standards contribution
– Regulation-aware and harmonisation
– Data-sharing across borders with advanced tech
Solution Principles
7 |
Examples from Australia
8 |
• Connect multiple technical risks when possible
• Vis responsible AI risks assessment (including privacy and data security)
• Focus on mitigations that help address multiple risks first
Connecting Risks via Integrated AI/Privacy/Data Risk Assessment
9 | https://research.csiro.au/ai4m/operationalising-responsible-ai/
https://research.csiro.au/isp/research/privacy/r4/
Closing the Gap via Engineering Practices
10 | https://research.csiro.au/ss/science/projects/responsible-ai-pattern-catalogue/
International Research Alliance in Responsible AI
• National Level Research Collaboration
• Germany/Fraunhofer, France/Confiance.AI, Canada/CIRFA, US NSF/NIST..
• System-level assessment and measurement focused
• Standards Contribution
• Cross-border data sharing for security and privacy research
• With secure enclave and privacy-preserving technologies
• With domains: Agrifood export, Hydrogen supply chain, ESG…
11 |
https://www.csiro.au/en/about/challenges-
missions/trusted-agrifood-exports
https://research.csiro.au/ss/science/projects/h
ydrogen-esg-certification/
• Connecting risks with concrete trade-offs/mitigations
– Privacy + Data Protection + AI Risks + Other risks
– Foundation model and LLM risks?
• Closing the gaps between privacy/protection principles & algorithms
– System-level views and engineering practices?
• Forming an international research alliance
– National-level research connections
– Coordinate on (de-facto) standards contribution?
– Regulation-aware and harmonisation?
– Data-sharing across borders with advanced tech?
Ways forward – How?
12 |

More Related Content

Similar to International Cooperation for Research on Privacy and Data Protection - Australia's Approach

Cyber technologies for SME growth – Barriers and Solutions
Cyber technologies for SME growth – Barriers and SolutionsCyber technologies for SME growth – Barriers and Solutions
Cyber technologies for SME growth – Barriers and Solutions
Liming Zhu
 
Simons orcid forum canberra 2018-PIDs in research
Simons orcid forum canberra 2018-PIDs in researchSimons orcid forum canberra 2018-PIDs in research
Simons orcid forum canberra 2018-PIDs in research
ARDC
 
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
Florence Hudson
 
Intro to RDM
Intro to RDMIntro to RDM
Intro to RDM
Sarah Jones
 
Open Access Week 2017: Introduction to Open Data Policies in H2020
Open Access Week 2017: Introduction to Open Data Policies in H2020Open Access Week 2017: Introduction to Open Data Policies in H2020
Open Access Week 2017: Introduction to Open Data Policies in H2020
OpenAIRE
 
General introduction to Open Data Policies H2020, influence of OD policies on...
General introduction to Open Data Policies H2020, influence of OD policies on...General introduction to Open Data Policies H2020, influence of OD policies on...
General introduction to Open Data Policies H2020, influence of OD policies on...
Nancy Pontika
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
Tomppa Järvinen
 
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018 e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES.eu
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES.eu
 
Distributed Trust Architecture: The New Foundation of Everything
Distributed Trust Architecture: The New Foundation of EverythingDistributed Trust Architecture: The New Foundation of Everything
Distributed Trust Architecture: The New Foundation of Everything
Liming Zhu
 
How to elaborate a data management plan
How to elaborate a data management planHow to elaborate a data management plan
How to elaborate a data management plan
Biblioteca de la Universitat Jaume I
 
Data sharing: How, what and why?
Data sharing: How, what and why?Data sharing: How, what and why?
Data sharing: How, what and why?
dancrane_open
 
OU Library Research Support webinar: Data sharing
OU Library Research Support webinar: Data sharingOU Library Research Support webinar: Data sharing
OU Library Research Support webinar: Data sharing
Daniel Crane
 
GenAI in Research with Responsible AI
GenAI in Researchwith Responsible AIGenAI in Researchwith Responsible AI
GenAI in Research with Responsible AI
Liming Zhu
 
Architecture and Standards
Architecture and StandardsArchitecture and Standards
Architecture and Standards
ARDC
 
PETRAS Hub Overview
PETRAS Hub OverviewPETRAS Hub Overview
PETRAS Hub Overview
IoTUK
 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016
Elsa Prieto
 
20160523 23 Research Data Things
20160523 23 Research Data Things20160523 23 Research Data Things
20160523 23 Research Data Things
Katina Toufexis
 
Making your research data open
Making your research data openMaking your research data open
Making your research data open
Daniel Crane
 
Making your research data open
Making your research data openMaking your research data open
Making your research data open
dancrane_open
 

Similar to International Cooperation for Research on Privacy and Data Protection - Australia's Approach (20)

Cyber technologies for SME growth – Barriers and Solutions
Cyber technologies for SME growth – Barriers and SolutionsCyber technologies for SME growth – Barriers and Solutions
Cyber technologies for SME growth – Barriers and Solutions
 
Simons orcid forum canberra 2018-PIDs in research
Simons orcid forum canberra 2018-PIDs in researchSimons orcid forum canberra 2018-PIDs in research
Simons orcid forum canberra 2018-PIDs in research
 
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
 
Intro to RDM
Intro to RDMIntro to RDM
Intro to RDM
 
Open Access Week 2017: Introduction to Open Data Policies in H2020
Open Access Week 2017: Introduction to Open Data Policies in H2020Open Access Week 2017: Introduction to Open Data Policies in H2020
Open Access Week 2017: Introduction to Open Data Policies in H2020
 
General introduction to Open Data Policies H2020, influence of OD policies on...
General introduction to Open Data Policies H2020, influence of OD policies on...General introduction to Open Data Policies H2020, influence of OD policies on...
General introduction to Open Data Policies H2020, influence of OD policies on...
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
 
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018 e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
 
Distributed Trust Architecture: The New Foundation of Everything
Distributed Trust Architecture: The New Foundation of EverythingDistributed Trust Architecture: The New Foundation of Everything
Distributed Trust Architecture: The New Foundation of Everything
 
How to elaborate a data management plan
How to elaborate a data management planHow to elaborate a data management plan
How to elaborate a data management plan
 
Data sharing: How, what and why?
Data sharing: How, what and why?Data sharing: How, what and why?
Data sharing: How, what and why?
 
OU Library Research Support webinar: Data sharing
OU Library Research Support webinar: Data sharingOU Library Research Support webinar: Data sharing
OU Library Research Support webinar: Data sharing
 
GenAI in Research with Responsible AI
GenAI in Researchwith Responsible AIGenAI in Researchwith Responsible AI
GenAI in Research with Responsible AI
 
Architecture and Standards
Architecture and StandardsArchitecture and Standards
Architecture and Standards
 
PETRAS Hub Overview
PETRAS Hub OverviewPETRAS Hub Overview
PETRAS Hub Overview
 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016
 
20160523 23 Research Data Things
20160523 23 Research Data Things20160523 23 Research Data Things
20160523 23 Research Data Things
 
Making your research data open
Making your research data openMaking your research data open
Making your research data open
 
Making your research data open
Making your research data openMaking your research data open
Making your research data open
 

More from Liming Zhu

AI Transformation A Clash with Human Expertise
AI TransformationA Clash with Human ExpertiseAI TransformationA Clash with Human Expertise
AI Transformation A Clash with Human Expertise
Liming Zhu
 
Deciphering AI: Human Expertise in the Age of Evolving AI
Deciphering AI: Human Expertise in the Age of Evolving AIDeciphering AI: Human Expertise in the Age of Evolving AI
Deciphering AI: Human Expertise in the Age of Evolving AI
Liming Zhu
 
Software Architecture for Foundation Model-Based Systems
Software Architecture for Foundation Model-Based SystemsSoftware Architecture for Foundation Model-Based Systems
Software Architecture for Foundation Model-Based Systems
Liming Zhu
 
AI Transformation
AI TransformationAI Transformation
AI Transformation
Liming Zhu
 
Generative-AI-in-enterprise-20230615.pdf
Generative-AI-in-enterprise-20230615.pdfGenerative-AI-in-enterprise-20230615.pdf
Generative-AI-in-enterprise-20230615.pdf
Liming Zhu
 
Trends & Innovation in Cyber and Digitaltech
Trends & Innovationin Cyber and DigitaltechTrends & Innovationin Cyber and Digitaltech
Trends & Innovation in Cyber and Digitaltech
Liming Zhu
 
Responsible/Trustworthy AI in the Era of Foundation Models
Responsible/Trustworthy AI in the Era of Foundation Models Responsible/Trustworthy AI in the Era of Foundation Models
Responsible/Trustworthy AI in the Era of Foundation Models
Liming Zhu
 
ICSE23 Keynote: Software Engineering as the Linchpin of Responsible AI
ICSE23 Keynote: Software Engineering as the Linchpin of Responsible AIICSE23 Keynote: Software Engineering as the Linchpin of Responsible AI
ICSE23 Keynote: Software Engineering as the Linchpin of Responsible AI
Liming Zhu
 
RegTech for IR - Opportunities and Lessons
RegTech for IR - Opportunities and LessonsRegTech for IR - Opportunities and Lessons
RegTech for IR - Opportunities and Lessons
Liming Zhu
 
Responsible AI The Australian Approach
Responsible AIThe Australian ApproachResponsible AIThe Australian Approach
Responsible AI The Australian Approach
Liming Zhu
 
Distributed Trust Architecture: The New Reality of ML-based Systems
Distributed Trust Architecture: The New Reality of ML-based SystemsDistributed Trust Architecture: The New Reality of ML-based Systems
Distributed Trust Architecture: The New Reality of ML-based Systems
Liming Zhu
 
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
Liming Zhu
 
Challenges in Practicing High Frequency Releases in Cloud Environments
Challenges in Practicing High Frequency Releases in Cloud Environments Challenges in Practicing High Frequency Releases in Cloud Environments
Challenges in Practicing High Frequency Releases in Cloud Environments
Liming Zhu
 
Dependable Operation - Performance Management and Capacity Planning Under Con...
Dependable Operation - Performance Management and Capacity Planning Under Con...Dependable Operation - Performance Management and Capacity Planning Under Con...
Dependable Operation - Performance Management and Capacity Planning Under Con...
Liming Zhu
 
Dependable Operations
Dependable OperationsDependable Operations
Dependable Operations
Liming Zhu
 
Modelling and Analysing Operation Processes for Dependability
Modelling and Analysing Operation Processes for Dependability Modelling and Analysing Operation Processes for Dependability
Modelling and Analysing Operation Processes for Dependability
Liming Zhu
 
Cloud API Issues: an Empirical Study and Impact
Cloud API Issues: an Empirical Study and ImpactCloud API Issues: an Empirical Study and Impact
Cloud API Issues: an Empirical Study and Impact
Liming Zhu
 

More from Liming Zhu (17)

AI Transformation A Clash with Human Expertise
AI TransformationA Clash with Human ExpertiseAI TransformationA Clash with Human Expertise
AI Transformation A Clash with Human Expertise
 
Deciphering AI: Human Expertise in the Age of Evolving AI
Deciphering AI: Human Expertise in the Age of Evolving AIDeciphering AI: Human Expertise in the Age of Evolving AI
Deciphering AI: Human Expertise in the Age of Evolving AI
 
Software Architecture for Foundation Model-Based Systems
Software Architecture for Foundation Model-Based SystemsSoftware Architecture for Foundation Model-Based Systems
Software Architecture for Foundation Model-Based Systems
 
AI Transformation
AI TransformationAI Transformation
AI Transformation
 
Generative-AI-in-enterprise-20230615.pdf
Generative-AI-in-enterprise-20230615.pdfGenerative-AI-in-enterprise-20230615.pdf
Generative-AI-in-enterprise-20230615.pdf
 
Trends & Innovation in Cyber and Digitaltech
Trends & Innovationin Cyber and DigitaltechTrends & Innovationin Cyber and Digitaltech
Trends & Innovation in Cyber and Digitaltech
 
Responsible/Trustworthy AI in the Era of Foundation Models
Responsible/Trustworthy AI in the Era of Foundation Models Responsible/Trustworthy AI in the Era of Foundation Models
Responsible/Trustworthy AI in the Era of Foundation Models
 
ICSE23 Keynote: Software Engineering as the Linchpin of Responsible AI
ICSE23 Keynote: Software Engineering as the Linchpin of Responsible AIICSE23 Keynote: Software Engineering as the Linchpin of Responsible AI
ICSE23 Keynote: Software Engineering as the Linchpin of Responsible AI
 
RegTech for IR - Opportunities and Lessons
RegTech for IR - Opportunities and LessonsRegTech for IR - Opportunities and Lessons
RegTech for IR - Opportunities and Lessons
 
Responsible AI The Australian Approach
Responsible AIThe Australian ApproachResponsible AIThe Australian Approach
Responsible AI The Australian Approach
 
Distributed Trust Architecture: The New Reality of ML-based Systems
Distributed Trust Architecture: The New Reality of ML-based SystemsDistributed Trust Architecture: The New Reality of ML-based Systems
Distributed Trust Architecture: The New Reality of ML-based Systems
 
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
 
Challenges in Practicing High Frequency Releases in Cloud Environments
Challenges in Practicing High Frequency Releases in Cloud Environments Challenges in Practicing High Frequency Releases in Cloud Environments
Challenges in Practicing High Frequency Releases in Cloud Environments
 
Dependable Operation - Performance Management and Capacity Planning Under Con...
Dependable Operation - Performance Management and Capacity Planning Under Con...Dependable Operation - Performance Management and Capacity Planning Under Con...
Dependable Operation - Performance Management and Capacity Planning Under Con...
 
Dependable Operations
Dependable OperationsDependable Operations
Dependable Operations
 
Modelling and Analysing Operation Processes for Dependability
Modelling and Analysing Operation Processes for Dependability Modelling and Analysing Operation Processes for Dependability
Modelling and Analysing Operation Processes for Dependability
 
Cloud API Issues: an Empirical Study and Impact
Cloud API Issues: an Empirical Study and ImpactCloud API Issues: an Empirical Study and Impact
Cloud API Issues: an Empirical Study and Impact
 

Recently uploaded

原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
Patrick Weigel
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
Ayan Halder
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
mz5nrf0n
 
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative AnalysisOdoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Envertis Software Solutions
 
Top 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptxTop 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptx
devvsandy
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
zOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL DifferenceszOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL Differences
YousufSait3
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
VALiNTRY360
 

Recently uploaded (20)

原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
 
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative AnalysisOdoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
 
Top 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptxTop 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptx
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
zOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL DifferenceszOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL Differences
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
 

International Cooperation for Research on Privacy and Data Protection - Australia's Approach

  • 1. Australia’s National Science Agency International Cooperation for Research on Privacy and Data Protection Australia’s Approach Liming Zhu Research Director, CSIRO’s Data61 Chair, Blockchain & Distributed Ledger Technology, Standards Australia ISO/IEC JTC 1/SC 42/WG 3 - Artificial intelligence – Trustworthiness
  • 2. CSIRO’s Data61: Australia’s Largest Data & Digital Innovation R&D Organisation 1000+ talented people (including affiliates/students) Home of Australia’s National AI Centre Data61 Generated 18+ Spin-outs 130+ Patent groups 200+ Gov & Corporate partners Facilities Mixed-Reality Lab Robotics Inno. Centre AI4Cyber HPC Enclave 300+ PhD students 30+ University collaborators Responsible Tech/AI Privacy & RegTech Engineering & Design of AI Systems Resilient & Recovery Tech Cybersecurity Digital Twin Spark (bushfire) toolkit 2 |
  • 3. § More sources & types from public & partners § Inter-governmental/cross-border data flow § Access and use of sensitive data from another organisation/country § Data analytics over encrypted data - ”sharing/use without access” § Foundation models and LLMs § Privacy and data security concerns Trend: Value Arises from Data Sharing & Joint Analytics Data sharing, Large-Language Models, Foundation Models 3 | Sensitive Data
  • 4. Trend: Regulation/Ethic Overlay Data Economy: Balancing Innovation & Regulation Burden Legislations and Standards • Global: GDPR, EU AI Act, NIST AI RMF, ISO AI Standards • Australia • AU Privacy Act Review • Security of Critical Infrastructure Act (SOCI) Amendments • Consumer Data Right (CDR): Open Banking, Energy, Telcom International Dynamics • Data, Software and AI Supply Chains • Data used in AI, Trustworthy data and AI • Responsible AI – Trust Data/AI-powered Service - Tradeoffs between Fairness/Transparency vs. Privacy/Security - Right to be forgotten 4 |
  • 5. • Human, societal and environmental wellbeing • Human-centred values • Fairness • Privacy protection and security • AU Privacy Act • Data Breach Notification • SOCI Amendments • Reliability and safety • Transparency and explainability • Contestability • Accountability Australian AI Ethics Principles Privacy and Data Protection is part of it 5 |
  • 6. • Risk silos competing for resources • Board risk committees: financial, legal, reputation – + HSE + privacy + security + ethics + AI + …. • Different stakeholder interests & complex landscape of risk assessment • Limited connections between risks assessed separately • Risk mgt perceived as a barrier – a separate thing dreaded doing • Preventing research collaboration Industry Challenge: Competing risk silos 6 |
  • 7. • Connecting risks with concrete trade-offs/mitigations – Privacy + Data Protection + AI Risks + other risks • Closing the Gaps between privacy/protection principles & algorithms – Algorithm-level approaches (like DP) are good starts – System-level views and engineering practices are next • Forming an international research alliance – National-level research connections – Coordinate on (de-facto) standards contribution – Regulation-aware and harmonisation – Data-sharing across borders with advanced tech Solution Principles 7 |
  • 9. • Connect multiple technical risks when possible • Vis responsible AI risks assessment (including privacy and data security) • Focus on mitigations that help address multiple risks first Connecting Risks via Integrated AI/Privacy/Data Risk Assessment 9 | https://research.csiro.au/ai4m/operationalising-responsible-ai/ https://research.csiro.au/isp/research/privacy/r4/
  • 10. Closing the Gap via Engineering Practices 10 | https://research.csiro.au/ss/science/projects/responsible-ai-pattern-catalogue/
  • 11. International Research Alliance in Responsible AI • National Level Research Collaboration • Germany/Fraunhofer, France/Confiance.AI, Canada/CIRFA, US NSF/NIST.. • System-level assessment and measurement focused • Standards Contribution • Cross-border data sharing for security and privacy research • With secure enclave and privacy-preserving technologies • With domains: Agrifood export, Hydrogen supply chain, ESG… 11 | https://www.csiro.au/en/about/challenges- missions/trusted-agrifood-exports https://research.csiro.au/ss/science/projects/h ydrogen-esg-certification/
  • 12. • Connecting risks with concrete trade-offs/mitigations – Privacy + Data Protection + AI Risks + Other risks – Foundation model and LLM risks? • Closing the gaps between privacy/protection principles & algorithms – System-level views and engineering practices? • Forming an international research alliance – National-level research connections – Coordinate on (de-facto) standards contribution? – Regulation-aware and harmonisation? – Data-sharing across borders with advanced tech? Ways forward – How? 12 |