blogs.sas.com
Open in
urlscan Pro
149.173.160.44
Public Scan
Submitted URL: http://safelinks.protection.outlook.com/?url=https%3A%2F%2Fblogs.sas.com%2Fcontent%2Fsascom%2F2023%2F05%2F31%2Fprivacy-security-responsi...
Effective URL: https://blogs.sas.com/content/sascom/2023/05/31/privacy-security-responsible-innovation/
Submission: On July 11 via api from US — Scanned from FR
Effective URL: https://blogs.sas.com/content/sascom/2023/05/31/privacy-security-responsible-innovation/
Submission: On July 11 via api from US — Scanned from FR
Form analysis
3 forms found in the DOMGET https://blogs.sas.com/content/
<form role="search" method="get" action="https://blogs.sas.com/content/">
<label for="searchFieldComponent">Search</label>
<input type="text" id="searchFieldComponent" name="s" value="" placeholder="Search">
<select name="fq" multiple="" style="display: none;">
</select>
<input class="searchButton" type="submit" value="Search">
</form>
GET https://blogs.sas.com/content/
<form role="search" action="https://blogs.sas.com/content/" method="get">
<input type="text" name="s" class="query" value="" placeholder="Search...">
<button class="search-button" type="submit"><i class="fa fa-search"></i></button>
</form>
POST https://blogs.sas.com/content/sascom/wp-comments-post.php
<form action="https://blogs.sas.com/content/sascom/wp-comments-post.php" method="post" id="commentform" class="comment-form" novalidate="">
<p>
<textarea name="comment" id="comment" cols="45" rows="8" aria-required="true" placeholder="Your Comment"></textarea>
</p>
<p>
<input name="author" id="author" type="text" size="30" aria-required="true" placeholder="Your Name" value="">
</p>
<p>
<input name="email" id="email" type="text" size="30" aria-required="true" placeholder="Your Email" value="">
</p>
<p>
<input name="url" id="url" type="text" size="30" placeholder="Your Website" value="">
</p>
<p class="comment-form-cookies-consent"><input id="wp-comment-cookies-consent" name="wp-comment-cookies-consent" type="checkbox" value="yes"> <label for="wp-comment-cookies-consent">Save my name, email, and website in this browser for the next time
I comment.</label></p>
<p class="form-submit"><input name="submit" type="submit" id="comment-submit" class="submit" value="Post Comment"> <input type="hidden" name="comment_post_ID" value="58735" id="comment_post_ID">
<input type="hidden" name="comment_parent" id="comment_parent" value="0">
</p>
<p style="display: none;"><input type="hidden" id="akismet_comment_nonce" name="akismet_comment_nonce" value="37c7f4ee44"></p>
<p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="1689086406368">
<script>
document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
</script>
</p>
</form>
Text Content
Skip to main content BLOGS * All SAS * Software * Software * SAS Viya * Industries * Solutions * Products * Learn * Learn * Training * Certification * Academics * Books * Video Tutorials * Support * Support * Communities * Documentation * Developers * Support & Services * User Groups * About Us * About Us * Why SAS? * Company * Careers * Newsroom * Events * Contact Us * Explore * Explore * Try & Buy * Why SAS? * Customer Stories * Partners * Consulting Close * Software * SAS Viya * Industries * Solutions * Products * Learn * Training * Certification * Academics * Books * Video Tutorials * Support * Communities * Documentation * Developers * Support & Services * User Groups * About Us * Why SAS? * Company * Careers * Newsroom * Events * Contact Us * Explore * Try & Buy * Why SAS? * Customer Stories * Partners * Consulting blogs.sas.com * sas.com * support.sas.com * blogs.sas.com * communities.sas.com * developer.sas.com Search * Select Your Region Visit the Cary, NC, US corporate headquarters site Americas Europe Middle East & Africa Asia Pacific View our worldwide contacts list for help finding your region Americas * Argentina * Brasil * Canada (English) * Canada (Français) * Chile * Colombia * México * Peru * United States Europe * Albania * Belgium * Bosnia & Herz. * Česká Republika * Croatia * Danmark * Deutschland * Ελλάδα * España * France * Iceland * Ireland * Italia * Luxembourg * Magyarország * Montenegro * Nederland * Norge * North Macedonia * Österreich * Polska * Portugal * România * Россия * Schweiz (Deutsch) * Serbia * Slovenia * Slovensko * Suisse (Français) * Suomi * Sverige * Türkiye * Україна * United Kingdom Middle East & Africa * Maroc * Middle East * Saudi Arabia * South Africa Asia Pacific * Australia * 中国 (简体中文) * Hong Kong * India * Indonesia (Bahasa) * Indonesia (English) * 日本 * 대한민국 * Malaysia * New Zealand * Philippines * Singapore * 台灣 (繁體中文) * Thailand (English) * ประเทศไทย (ภาษาไทย) * Search * Worldwide Sites * Contact Us * SAS Sites * Sign In * Sign Out Sign In Create Profile My SAS Get access to My SAS, trials, communities and more. Sign Out Edit Profile My SAS Get access to My SAS, trials, communities and more. SAS Sites sas.com Support Blogs Communities Developer Curiosity Videos Merchandise Brand PartnerNet BLOGS BLOGS Navigate * Resiliency Rules * All Topics * Advanced Analytics * Analytics * Artificial Intelligence * Cloud * Customer Intelligence * Data for Good * Data Management * Data Visualization * Featured * Fraud & Security Intelligence * Internet of Things * Learn SAS * Machine Learning * Programming Tips * Risk Management * SAS Administrators * SAS Events * Students & Educators * All Industries * Banking * Communications * Education * Energy & Utilities * Government * Health Care * Hospitality * Insurance * Life Sciences * Manufacturing * Retail * Sports & Entertainment * Travel * Blog Directory * Subscribe Equity and Responsibility UNDERSTANDING THE ROLE OF PRIVACY AND SECURITY IN RESPONSIBLE INNOVATION By Kristi Boyd on May 31, 2023 2 Comments AS ORGANIZATIONS EMBRACE AI, THEY OFTEN HANDLE LARGE VOLUMES OF DATA THAT POWER AI SYSTEMS. HANDLING DATA APPROPRIATELY INCLUDES IMPLEMENTING ADEQUATE PRIVACY POLICIES AND SECURITY MEASURES TO PROTECT IT. DOING SO PREVENTS ACCIDENTAL EXPOSURE AND ENSURES ETHICAL DATA USE. AI technology often uses sensitive data for creating, training and utilizing models. This data may contain private information about people, sensitive business use cases, or health care data. Unauthorized access to or inappropriate disclosure of these types of data can cause harm to individuals or organizations. In response, governments have expanded privacy and security laws. These laws protect individual data subjects' privacy and set up guardrails to minimize sensitive data exposures and data breaches. Read more stories in this series about data ethics principles While privacy and security were previously associated with intellectual property (IP) and cybersecurity, the definition and scope have expanded in recent years.to encompass data access management, data localization and the rights of data subjects. It’s important that organizations, especially those using or building AI solutions, be aware of privacy and security best practices and regulations. Interestingly, existing privacy regulations overlap with upcoming AI regulations, as both emphasize principles such as explainability, fairness and security. In fact, a recent study found that more than 50% of organizations develop their AI governance on top of existing privacy frameworks. These organizations see parallels between keeping data secure and keeping AI models well-governed. Responsible innovators understand the need to meet regulatory requirements and respect the privacy and security of training data subjects. Let‘s discuss three things organizations can do to make sure their data is more private and secure. 1. DATA MASKING: RESPECTING THE PRIVACY OF SUBJECTS A global study recently found that 68% of consumers are concerned with their online privacy. While the study focused on data collection while browsing online, the message is clear – consumers care about their data and how it is collected, processed and used. For organizations processing data containing personal or sensitive information, it is imperative to effectively protect data subjects’ privacy and data masking can help. Data masking is a technique used to protect sensitive information by randomizing, substituting or reshuffling original data with similar values. In other words, you’re “hiding” the data's values. This method ensures that the data remains usable for testing, development or training purposes while minimizing the risk of exposing sensitive information. Data masking can protect addresses, names, social security numbers, intellectual property and financial information, among other sensitive information. Fig 1: SAS® Information Catalog Overview tab displaying Information Privacy Fig 2: Data masking using SAS® Studio custom tasks 2. AUTHORIZATION MANAGEMENT: WHO NEEDS TO KNOW? Authorization management is integral to data hygiene and data management. In a physical office, an organization may have spaces open to guests and visitors; employees only; or special access required. If you have a business visitor, you will likely hand out day visitor passes and invite them to the conference rooms but not give them the building security codes. Authorization management is a similar concept but in the digital domain. Not everyone needs the same level of access when engaging with data and seeking data-driven insights. In many cases, only select data scientists in your organization need access to the full data set to find the most relevant and enlightening insights. These insights can then be shared with the appropriate employees without disclosing the underlying sensitive data. Authorization management asks, “Does this person need to see the data, or do they just need the insights?” A good authorization management practice is to apply a least-privileges model that grants each role the minimum access required to complete the tasks they have on hand successfully. Similarly, setting up user groups to manage appropriate rights can help restrict data usage on a need-to-know basis. This approach ensures that those with a legitimate need only access sensitive information. By limiting access in this way, organizations can improve their data hygiene and protect sensitive information from those with unauthorized access or disclosure. Fig 3: SAS® Environment Manager CAS library authorization 3. SAFEGUARDING AGAINST EXTERNAL ATTACKS Data masking and authorization management provide privacy to the data subjects when their data is used within the organization. However, it is important not to overlook the possibility of adverse external influences. Organizations are exposed to increasing malicious attacks, which increases the importance of having a private and secure environment. One type of attack that organizations should be particularly wary of is adversarial attacks. These attacks can muddy the data and introduce incorrect variables in the machine learning models by fooling the models with deceptive data and labeling. This can lead to incomplete or inaccurate data points, which may harm not only the business but also the individual employees and users of the system. For these reasons and more, organizations should take active steps to mitigate these external attacks by using adversarial training, detecting and cleaning adversarial inputs, and implementing differential privacy in training data. Additionally, monitoring input variables that exhibit substantial distribution shifts could help defend against data poisoning attacks. UPHOLDING ETHICAL STANDARDS At SAS, we consider privacy and security principles essential to responsible innovation. As a global company with operations in over 50 countries, we collect personal data from our customers, prospects, partners, suppliers, applicants and employees. To protect the data as a data processor and controller, we work with multiple third-party and regulatory frameworks to stay on top of industry standards and regulations. With data masking, authorization management and proactive defense against external attacks, organizations can create a private and secure environment to protect data. These measures protect individuals and organizations and uphold ethical standards and regulatory compliance in the AI landscape. STAY INFORMED ABOUT WHERE YOUR DATA IS LOCATED, HOW IT IS USED AND HOW WE PROTECT AND DEFEND YOUR DATA. Kristi Boyd and Vrushali Sawant made contributions to this article Tags data ethics stories innovation resiliency resiliency rules responsible innovation Trustworthy AI Share Twitter Facebook Pinterest LinkedIn Email XING ABOUT AUTHOR Kristi Boyd Trustworthy AI Specialist Kristi Boyd is the Trustworthy AI Specialist with SAS' Data Ethics Practice (DEP) and supports the Trustworthy AI strategy with a focus on the pre-sales, sales & consulting teams. She is passionate about responsible innovation and has an R&D background as a QA engineer and product manager. She is also a proud Duke alumna (go Blue Devils!). 2 COMMENTS 1. Deb Roughton on May 31, 2023 2:09 pm Thanks for the article Kristi! Great info Reply 2. Franklin J Manchester on June 2, 2023 12:32 pm It's such a simple question to ask, "where's your data?" I wonder how many organizations cannot, fully answer that question. Reply LEAVE A REPLY CANCEL REPLY Save my name, email, and website in this browser for the next time I comment. Δ Back to Top Curiosity is our code. SAS analytics solutions transform data into intelligence, inspiring customers around the world to make bold new discoveries that drive progress. Contact Us FOLLOW US * Facebook * Twitter * LinkedIn * YouTube * RSS Explore * Accessibility * Careers * Certification * Communities * Company * Developers * Documentation * For Educators * Events * Industries * My SAS * Newsroom * Products * SAS Viya * Solutions * Students * Support & Services * Training * Try/Buy * Video Tutorials * Why SAS? What is... WHAT IS... * Analytics * Artificial Intelligence * Cloud Computing * Data Science * Digital Transformation * Internet of Things * Cookie Préférences * Privacy Statement * Terms of Use * Trust Center * ©2023 SAS Institute Inc. All Rights Reserved. * Contact Us * Share * Subscribe Share this Share this page with friends or colleagues.