www.computerweekly.com
Open in
urlscan Pro
2606:4700::6812:1cda
Public Scan
Submitted URL: https://e.zmp.techtarget.com/click?EZmlvbmEudGF5bG9yQGViZ2FtZXMuY29t/CeyJtaWQiOiIxNjg4NDMwNzE4NDY4Mzc3NWVhYTc0MTY2IiwiY3QiOiJ...
Effective URL: https://www.computerweekly.com/feature/ChatGPT-is-creating-a-legal-and-compliance-headache-for-business?utm_campaign=20230703_H...
Submission: On July 04 via api from US — Scanned from DE
Effective URL: https://www.computerweekly.com/feature/ChatGPT-is-creating-a-legal-and-compliance-headache-for-business?utm_campaign=20230703_H...
Submission: On July 04 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMGET https://www.computerweekly.com/search/query
<form action="https://www.computerweekly.com/search/query" method="get" class="header-search">
<label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
<input class="header-search-input" id="header-search-input" type="text" name="q" placeholder="Search Computer Weekly">
<button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
<ul class="ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all" id="ui-id-1" tabindex="0" style="display: none;"></ul>
</form>
Text Content
3 Trending Now 2023 IT Priorities APAC ReportDownload NowView All3 X 3Hello, these 3 documents have been trending and as a member they are free to you. * 2023 IT Priorities APAC ReportDownload Now * Innovation Awards APAC 2023 - Project of the Year: Mondelez InternationalDownload Now * Innovation Awards APAC 2023 - Telecommunications: SensorFlowDownload Now Search the TechTarget Network Join CW+ Login Register Cookies * News * In Depth * Blogs * Opinion * Videos * Photo Stories * Premium Content * Webinars * IT Salary Survey infographic RSS * IT Management * IT leadership & CW500 * IT architecture * IT efficiency * Governance * Innovation * Legislation & regulation * Operations & support * Project management * Strategy * Supplier management * Business issues * Sponsored Communities * Industry Sectors * Healthcare IT * Charity IT * Business services IT * Financial services IT * Government & public sector IT * Leisure & hospitality IT * Manufacturing IT * Media & entertainment IT * Retail IT * SME IT * Telecoms & internet * Transport & travel IT * Utilities IT * IT suppliers * Technology Topics Datacentre View All * Clustering for high availability and HPC * Containers * Converged infrastructure * Datacentre backup power and power distribution * Datacentre capacity planning * Datacentre cooling infrastructure * Disaster recovery/security * Green IT * Performance, monitoring and optimisation * Systems management * DevOps * IaaS * Server and Operating Systems * PaaS * Virtualisation * SaaS * Desktop virtualisation platforms Enterprise software View All * AI and automation * Blockchain * Business applications * Business intelligence * Cloud applications * Collaboration * CRM * Database * ERP * Financial applications * HR software * Middleware * Microservices * Windows * Mobile * Open source * Operating systems * SOA * Software development * Software licensing * Virtualisation * Web software IT in Europe and Middle East View All * IT in France * IT in the Nordics * IT in Benelux * IT in Germany * IT in Italy * IT in Poland * IT in Russia * IT in Spain * IT in the Middle East * IT in Turkey Information Management View All * Big data * Business intelligence and analytics * BPM * Content management * Database management * Quality/governance * Data warehousing * MDM/Integration IT in Asia-Pacific View All * IT in ASEAN * IT in Australia & New Zealand * IT in India Internet View All * Cloud * E-commerce * Internet infrastructure * Social media * Web development IT skills View All * Diversity in IT * Training * Jobs * Management skills * Technical skills Hardware View All * Chips & processors * Printers * Storage * Data centre * Mobile * Networking * PC * Servers IT security View All * Antivirus * Secure Coding and Application Programming * Continuity * Cloud security * Data Breach Incident Management and Recovery * Endpoint and NAC Protection * Cybercrime * IAM * Risk management * Network Security Management * Data protection * Compliance Regulation and Standard Requirements * Security policy and user awareness * Web Application Security IT services View All * Cloud * Consultancy * Outsourcing * Hosting * Offshore * Startups Mobile View All * Laptop * Mobile software * Mobile networking * Smartphone * Tablet Networking View All * Datacentre networking * Internet of Things * Mobile * Network hardware * Network monitoring and analysis * Network routing and switching * Network security strategy * Network software * Software-defined networking * Telecoms networks and broadband communications * Unified communications * VoIP * WAN performance and optimisation * Wireless Storage View All * Cloud storage * Containers and storage * Backup * Compliance and storage * Disaster recovery * Flash and SSDs * Hyper-convergence * Object storage * Disk systems * Software-defined storage * Storage switches * Storage management * Storage performance * Virtualisation and storage Please select a category * Datacentre * Enterprise software * IT in Europe and Middle East * Information Management * IT in Asia-Pacific * Internet * IT skills * Hardware * IT security * IT services * Mobile * Networking * Storage * Follow: * * * * ComputerWeekly.com.br * ComputerWeekly.de * ComputerWeekly.es * LeMagIT.fr * MicroScope.co.uk * Home * Regulatory compliance and standard requirements kirill_makarov - stock.adobe.com kirill_makarov - stock.adobe.com Feature CHATGPT IS CREATING A LEGAL AND COMPLIANCE HEADACHE FOR BUSINESS CHATGPT’S INCREASED USE IN THE WORKPLACE HAS LED MANY TO QUESTION ITS LEGAL AND COMPLIANCE IMPLICATIONS FOR BUSINESSES. EXPERTS WARN THAT THE SOFTWARE POSES MAJOR SECURITY AND COPYRIGHT RISKS * Share this item with your network: * * * * * * * * * * * * By * Nicholas Fearn Published: 20 Jun 2023 Over the past few months, ChatGPT has taken the professional world by storm. Its ability to answer almost any question and generate content has led people to use the artificial intelligence-powered chatbot for completing administrative tasks, writing long-form content like letters and essays, creating resumes, and much more. According to research from Korn Ferry, 46% of professionals are using ChatGPT for finishing tasks in the workplace. Another survey found that 45% of employees see ChatGPT as a means of achieving better results in their roles. But there seems to be a darker side to artificial intelligence (AI) software that is being overlooked by employees. Many employers fear their staff sharing sensitive corporate information with AI chatbots like ChatGPT, which could end up in the hands of cyber criminals. And there’s also a question about copyright when employees use ChatGPT for automatically generating content. AI tools can even be biased and discriminatory, potentially causing huge problems for companies relying on them for screening potential employees or answering questions from customers. These issues have led many experts to question the security and legal implications of ChatGPT’s usage in the workplace. INCREASED DATA SECURITY RISKS The increased use of generative AI tools in the workplace makes businesses highly vulnerable to serious data leaks, according to Neil Thacker, chief information security officer (CISO) for EMEA and Latin America at Netskope. He points out that OpenAI, the creator of ChatGPT, uses data and queries stored on its servers for training its models. And should cyber criminals breach OpenAI’s systems, they could gain access to “confidential and sensitive data” that would be “damaging” for businesses. OpenAI has since implemented "opt-out" and "disable history" options in a bid to improve data privacy, but Thacker says users will still need to manually select these. While laws like the UK’s Data Protection and Digital Information Bill and the European Union's proposed AI Act are a step in the right direction regarding the regulation of software like ChatGPT, Thacker says there are “currently few assurances about the way companies whose products use generative AI will process and store data”. BANNING AI ISN’T THE SOLUTION Employers concerned about the security and compliance risks of AI services may decide to ban their use in the workplace. But Thacker warns this could backfire. “Banning AI services from the workplace will not alleviate the problem as it would likely cause ‘shadow AI’ – the unapproved use of third-party AI services outside of company control,” he says. > AI is more valuable when combined with human intelligence Ingrid Verschuren, > Dow Jones Ultimately, it is the responsibility of security leaders to ensure that employees use AI tools safely and responsibly. To do this, they need to “know where sensitive information is being stored once fed into third-party systems, who is able to access that data, how they will use it, and how long it will be retained”. Thacker adds: “Companies should realise that employees will be embracing generative AI integration services from trusted enterprise platforms such as Teams, Slack, Zoom and so on. Similarly, employees should be made aware that the default settings when accessing these services could lead to sensitive data being shared with a third-party.” USING AI TOOLS SAFELY IN THE WORKPLACE Individuals who use ChatGPT and other AI tools at work could unknowingly commit copyright infringement, meaning their employer may be subjected to costly lawsuits and fines. Barry Stanton, partner and head of the employment and immigration team at law firm Boyes Turner, explains: “Because ChatGPT generates documents produced from information already stored and held on the internet, some of the material it uses may inevitably be subject to copyright. “The challenge – and risk – for businesses is that they may not know when employees have infringed another’s copyright, because they can’t check the information source.” For businesses looking to experiment with AI in a safe and ethical manner, it’s paramount that security and HR teams create and implement “very clear policies specifying when, how and in what circumstances it can be used”. Stanton says businesses could decide only to use AI “solely for internal purposes” or “in limited external circumstances”. He adds: “When the business has outlined these permissions, the IT security team needs to ensure that it then, so far as technically possible, locks down any other use of ChatGPT.” THE RISE OF COPYCAT CHATBOTS With the hype surrounding ChatGPT and generative AI continuing to grow, cyber criminals are taking advantage of this by creating copycat chatbots designed to steal data from unsuspecting users. Alex Hinchliffe, threat intelligence analyst at Unit 42, Palo Alto Networks, says: “Some of these copycat chatbot applications use their own large language models, while many claim to use the Chat GPT public API. However, these copycat chatbots tend to be pale imitations of ChatGPT or simply malicious fronts to gather sensitive or confidential data. “The risk of serious incidents linked to these copycat apps is increased when staff start experimenting with these programs on company data. It is also likely that some of these copycat chatbots are manipulated to give wrong answers or promote misleading information.” To stay one step ahead of spoofed AI applications, Hinchliffe says users should avoid opening ChatGPT-related emails or links that appear to be suspicious and always access ChatGPT via OpenAI’s official website. CISOs can also mitigate the risk imposed by fake AI services by only allowing employees to access apps via legitimate websites, Hinchliffe recommends. They should also educate employees on the implications of sharing confidential information with AI chatbots. Hinchliffe says CISOs particularly concerned about the data privacy implications of ChatGPT should consider implementing software such as a cloud access service broker (CASB). “The key capabilities are having comprehensive app usage visibility for complete monitoring of all software as a service (SaaS) usage activity, including employee use of new and emerging generative AI apps that can put data at risk,” he adds. “Granular SaaS application controls mean allowing employee access to business-critical applications, while limiting or blocking access to high-risk apps like generative AI. And finally, consider advanced data security that uses machine learning to classify data and detect and stop company secrets being leaked to generative AI apps inadvertently.” DATA RELIABILITY IMPLICATIONS In addition to cyber security and copyright implications, another major flaw of ChatGPT is the reliability of the data powering its algorithms. Ingrid Verschuren, head of data strategy at Dow Jones, warns that even “minor flaws will make outputs unreliable”. She tells Computer Weekly: “As professionals look to leverage AI and chatbots in the workplace, we are hearing growing concerns around auditability and compliance. The application and implementation of these emerging technologies therefore requires careful consideration – particularly when it comes to the source and quality of the data used to train and feed the models.” Generative AI applications scrape data from across the internet and use this information to answer questions from users. But given that not every piece of internet-based content is accurate, there’s a risk of apps like ChatGPT spreading misinformation. Verschuren believes the creators of generative AI software should ensure data is only mined from “reputable, licensed and regularly updated sources” to tackle misinformation. “This is why human expertise is so crucial – AI alone cannot determine which sources to use and how to access them,” she adds. “Our philosophy at Dow Jones is that AI is more valuable when combined with human intelligence. We call this collaboration between machines and humans 'authentic intelligence', which combines the automation potential of the technology with the wider decisive context that only a subject matter expert can bring.” USING CHATGPT RESPONSIBLY Businesses allowing their staff to use ChatGPT and generative AI in the workplace open themselves up to “significant legal, compliance, and security considerations”, according to Craig Jones, vice president of security operations at Ontinue. However, he says there are a range of steps that firms can take to ensure their employees use this technology responsibly and securely. The first is taking into account data protection regulations. “Organisations need to comply with regulations such as GDPR or CCPA. They should implement robust data handling practices, including obtaining user consent, minimising data collection, and encrypting sensitive information, “ he says. “For example, a healthcare organisation utilising ChatGPT must handle patient data in compliance with the Data Protection Act to protect patient privacy.” Second, Jones urges businesses to consider intellectual property rights when it comes to using ChatGPT. This is due to the fact that ChatGPT is essentially a content generation tool. He recommends that firms “establish clear guidelines regarding ownership and usage rights” for proprietary and copyrighted data. “By defining ownership, organisations can prevent disputes and unauthorised use of intellectual property. For instance, a media company using ChatGPT needs to establish ownership of articles or creative works produced by the AI - this is very much open to interpretation as is,” he says. “In the context of legal proceedings, organisations may be required to produce ChatGPT-generated content for e-discovery or legal hold purposes. Implementing policies and procedures for data preservation and legal holds is crucial to meet legal obligations. Organisations must ensure that the generated content is discoverable and retained appropriately. For example, a company involved in a lawsuit should have processes in place to retain and produce ChatGPT conversations as part of the e-discovery process.” READ MORE ABOUT GENERATIVE AI SAFETY * How AI ethics is coming to the fore with generative AI - The hype around ChatGPT and other large language models is driving more interest in AI and putting ethical considerations surrounding their use to the fore. * Generative AI – the next biggest cyber security threat? - Following the launch of ChatGPT in November 2022, several reports have emerged that seek to determine the impact of generative AI in cyber security. * UK taskforce set to drive generative AI safety and opportunities - The government has committed £100m to helping the UK develop and build out generative artificial intelligence capabilities. Something else to consider is the fact that AI tools often exhibit signs of bias and discrimination, which can cause serious reputational and legal damage to businesses using this software for customer service and hiring. But Jones says there are several techniques businesses can adopt to tackle AI bias, such as holding audits regularly and monitoring the responses provided by chatbots. He adds: “In addition, organisations need to develop an approach to assessing the output of ChatGPT, ensuring that experienced humans are in the loop to determine the validity of the outputs. This becomes increasingly important if the output of a ChatGPT-based process feeds into a subsequent automated stage. In early adoption phases, we should look at ChatGPT as decision support as opposed to the decision maker.” Despite the security and legal implications of using ChatGPT at work, AI technologies are still in their infancy and are here to stay. Jake Moore, global cyber security advisor at ESET, concludes: “It must be reminded that we are still in the very early stages of chatbots. But as time goes on, they will supersede traditional search engines and become a part of life. The data generated from our Google searches can be sporadic and generic, but chatbots are already becoming more personal with the human-led conversations in order to seek out more from us.” READ MORE ON REGULATORY COMPLIANCE AND STANDARD REQUIREMENTS * GENERATIVE AI: DATA PRIVACY, BACKUP AND COMPLIANCE By: Stephen Pritchard * BARD VS. CHATGPT: WHAT'S THE DIFFERENCE? By: Amanda Hetler * WHAT GENERATIVE AI'S RISE MEANS FOR THE CYBERSECURITY INDUSTRY By: Alexander Culafi * REINFORCEMENT LEARNING FROM HUMAN FEEDBACK (RLHF) By: Andy Patrizio Latest News * OneWeb expands commercial service across Europe, US * Next-generation mobile lands on Channel Islands with Jersey Telecom * BlackCat gang claims cyber attack on Barts NHS Trust * View All News Download Computer Weekly * In The Current Issue: * Rishi Sunak calls for urgency in building out UK tech * Keir Starmer calls for AI job loss discussion * CTO interview: Europe benefits from energy gains in AMD chips Download Current Issue Latest Blog Posts * SASE Delivery - Is A PoP always a PoP? What to look for... – Networks Generation * Top Of The SASE PoPs – Networks Generation * View All Blogs Related Content * Bard vs. ChatGPT: What's the difference? – WhatIs.com * 6 risks of ChatGPT in customer service – Customer Experience * How to use ChatGPT for customer service – Customer Experience Latest TechTarget resources * CIO * Security * Networking * Data Center * Data Management CIO * Tech integration partnerships can help boost IT productivity Enterprise Strategy Group's Doug Cahill discusses survey results that show using integrated technologies from multiple vendors ... * 8 blockchain-as-a-service providers to have on your radar You don't have to build your blockchain project from the ground up. These cloud-based service providers can provide the necessary... * Ultimate guide to digital transformation for enterprise leaders This in-depth guide explains what digital transformation is, why it is important and how enterprises can successfully transition ... Security * TSMC partner breached by LockBit ransomware gang A cyber attack against Chinese systems integrator Kinmax led to the theft of TSMC proprietary data, which LockBit threatened to ... * AI helps humans speed app modernization, improve security Enterprises are looking at AI-driven approaches to help human teams modernize and accelerate application development to refactor ... * Quishing on the rise: How to prevent QR code phishing A monthslong quishing campaign demonstrated how cybercriminals are using QR codes to trick users. Here's what enterprise security... Networking * Prosimo offers free multi-cloud connectivity The new MCN Foundation can find and connect to public clouds and provide visibility. The company's full-stack product powers the ... * Cisco to add SamKnows broadband visibility to ThousandEyes SamKnows data in ThousandEyes will let enterprises monitor the broadband connections of employees working from home. The ... * 10 edge computing quiz questions Edge computing isn't new, but it has grown in popularity due to 5G and the influx of IoT devices. This quiz covers edge computing... Data Center * Reimaging, innovating, securing cloud-native at SUSECON 2023 At SUSECON 2023, SUSE announced cloud-native AI-based observability with Opni and alluded to more announcements this year. ... * Data center tiers and why they matter for uptime Organizations should consider data center tiers of colocation providers or for their own data centers based on their uptime needs... * Explore Red Hat's bring-your-own-subscription model for RHEL Many organizations use pay-as-you-go models with public cloud providers to run their Red Hat products in the cloud. Explore how ... Data Management * Grow data trust to avoid customer and corporate consequences A lack of data trust can undermine customer loyalty and corporate success. To avoid the consequences, understand the effects of ... * Databricks introduces Delta Lake 3.0 to help unify data As part of the open source community developing the data storage platform, the vendor unveiled the platform's latest iteration ... * Use knowledge graphs with databases to uncover new insights Knowledge graphs work with graph databases to offer different data storage options than a traditional database, particularly in ... * About Us * Editorial Ethics Policy * Meet The Editors * Contact Us * Our Use of Cookies * Advertisers * Business Partners * Media Kit * Corporate Site * Contributors * Reprints * Answers * E-Products * Events * In Depth * Guides * Opinions * Quizzes * Photo Stories * Tips * Tutorials * Videos * Computer Weekly Topics All Rights Reserved, Copyright 2000 - 2023, TechTarget Privacy Policy Cookie Preferences Do Not Sell or Share My Personal Information Close