In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-29 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > IT Information >
Share
Shulou(Shulou.com)11/24 Report--
Thanks CTOnews.com netizen purple clothes scholar's clue delivery! CTOnews.com, October 12, according to the official website of the National Information Security Standardization Technical Committee, the technical document "basic requirements for Security of generative artificial Intelligence Services" (hereinafter referred to as "requirements") formulated by the association was formed on October 11, and the technical document is now open to the public for comment. If there are any comments or suggestions, feedback should be made before 24:00 on October 25.
"requirements" gives the basic security requirements of generative artificial intelligence services, including corpus security, model security, security measures, security assessment and so on. it is suitable for the providers of generative artificial intelligence services to improve the service security level, or to carry out security assessment by themselves or by entrusting a third party. It can also provide a reference for the relevant competent departments to evaluate the safety level of generative artificial intelligence services.
The requirements for the collation section of the image source PexelsCTOnews.com are as follows:
Establish a blacklist of corpus sources and do not use the data from the blacklist for training.
The security assessment of the corpus of all sources should be carried out, and the single source corpus containing more than 5% of the illegal and undesirable information should be added to the blacklist.
When the corpus containing personal information should be used, obtain the authorization consent of the corresponding personal information subject, or meet other conditions for the legal use of the personal information.
When the corpus containing biometric information such as human face should be used, the written authorization of the corresponding personal information subject should be obtained, or other conditions for the legal use of the biometric information should be met.
The labeling personnel shall be assessed on their own, qualified persons shall be given qualifications, and there shall be a mechanism for regular retraining and assessment, as well as suspending or canceling labeling qualifications if necessary.
In the process of training, the security of generated content should be taken as one of the main indicators to evaluate the results.
If the service is provided through an interactive interface, the following information shall be disclosed to the public at a prominent location such as the home page of the website:
-Information on the crowd, occasion, use, etc., applicable to the service
-usage of the third-party basic model.
The necessity, applicability and security of applying generative artificial intelligence in various fields within the scope of service should be fully demonstrated.
According to previous reports by CTOnews.com, the Internet Information Office, the National Development and Reform Commission, the Ministry of Education, the Ministry of Science and Technology, the Ministry of Industry and Information Technology, the Ministry of Public Security and the State Administration of Radio and Television issued the interim measures for the Administration of generative artificial Intelligence Services on July 10, which will enter into force on August 15.
The measures stipulate that monopoly and unfair competition shall not be carried out by making use of the advantages of algorithms, data, and platforms; they shall not endanger the physical and mental health of others, or infringe upon other people's portrait rights, reputation rights, honor rights, privacy rights and personal information rights and interests; effective measures should be taken to enhance the transparency of generative artificial intelligence services and improve the accuracy and reliability of generated content.
Referenc
Notice on soliciting comments on the Technical document "basic Security requirements for generative artificial Intelligence Services" (draft for soliciting opinions) of the Information Security and Standards Commission
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.