search
HomeTechnology peripheralsAI'Basic Security Requirements for Generative Artificial Intelligence Services' is publicly soliciting opinions. The use of corpora containing personal information must be authorized by the corresponding entity.

Basic Security Requirements for Generative Artificial Intelligence Services is publicly soliciting opinions. The use of corpora containing personal information must be authorized by the corresponding entity.

News on October 12, according to the official website of the National Information Security Standardization Technical Committee, the committee has formulated a draft of the technical document "Basic Requirements for Generative Artificial Intelligence Service Security" . The technical document is now open to the public for comments. If you have any comments or suggestions, please provide feedback before 24:00 on October 25th

Basic Security Requirements for Generative Artificial Intelligence Services is publicly soliciting opinions. The use of corpora containing personal information must be authorized by the corresponding entity.

"Requirements" are given The basic security requirements for generative artificial intelligence services, including corpus security, model security, security measures, security assessment, etc., are suitable for providers who provide generative artificial intelligence services to the public in my country to improve service security levels, or the provider conducts a security assessment on its own or entrusts a third party to conduct a security assessment, which can also provide a reference for relevant authorities to evaluate the security level of generative artificial intelligence services.

The requirements for organizing this site are as follows:

  • Establish a blacklist of corpus sources, and data from the blacklist sources must not be used for training.
  • Security assessments should be conducted on each source of corpus. If the content of a single source of corpus contains more than 5% of illegal and harmful information, it should be added to the blacklist.
  • When using corpus containing personal information, the authorization and consent of the corresponding personal information subject should be obtained, or other conditions for the legal use of the personal information should be met.
  • When using corpus containing biometric information such as faces, the written authorization and consent of the corresponding personal information subject should be obtained, or other conditions for the legal use of the biometric information should be met.
  • The annotators should be assessed by themselves, those who pass the exam should be given annotation qualifications, and there should be a mechanism for regular retraining and assessment, as well as a mechanism for suspending or canceling the annotation qualifications when necessary.
  • During the training process, the security of the generated content should be one of the main considerations for evaluating the quality of the generated results.
  • If services are provided through an interactive interface, the following information should be disclosed to the public in a prominent position such as the homepage of the website:

The content that needs to be rewritten is: - the groups and occasions for which the service is applicable , usage and other information Rewritten content: - Service information suitable for different groups of people, occasions and purposes

Usage status of third-party basic models

  • should be fully demonstrated for application in various fields within the service scope The necessity, applicability, and safety of generative artificial intelligence.

According to previous reports on this site, seven departments including the Cyberspace Administration of China, the National Development and Reform Commission, the Ministry of Education, the Ministry of Science and Technology, the Ministry of Industry and Information Technology, the Ministry of Public Security, and the State Administration of Radio and Television issued the "Generative Artificial Intelligence" on July 10. Interim Measures for Intelligent Service Management, which will come into effect on August 15.

The "Measures" stipulate that no one shall use the advantages of algorithms, data, platforms, etc. to carry out monopoly and unfair competition; shall not endanger the physical and mental health of others, and shall not infringe the portrait rights, reputation rights, honor rights, privacy rights and personal rights of others. Information rights; effective measures should be taken to enhance the transparency of generative artificial intelligence services and improve the accuracy and reliability of generated content.

Reference

The above is the detailed content of 'Basic Security Requirements for Generative Artificial Intelligence Services' is publicly soliciting opinions. The use of corpora containing personal information must be authorized by the corresponding entity.. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:51CTO.COM. If there is any infringement, please contact admin@php.cn delete
Tesla's Robovan Was The Hidden Gem In 2024's Robotaxi TeaserTesla's Robovan Was The Hidden Gem In 2024's Robotaxi TeaserApr 22, 2025 am 11:48 AM

Since 2008, I've championed the shared-ride van—initially dubbed the "robotjitney," later the "vansit"—as the future of urban transportation. I foresee these vehicles as the 21st century's next-generation transit solution, surpas

Sam's Club Bets On AI To Eliminate Receipt Checks And Enhance RetailSam's Club Bets On AI To Eliminate Receipt Checks And Enhance RetailApr 22, 2025 am 11:29 AM

Revolutionizing the Checkout Experience Sam's Club's innovative "Just Go" system builds on its existing AI-powered "Scan & Go" technology, allowing members to scan purchases via the Sam's Club app during their shopping trip.

Nvidia's AI Omniverse Expands At GTC 2025Nvidia's AI Omniverse Expands At GTC 2025Apr 22, 2025 am 11:28 AM

Nvidia's Enhanced Predictability and New Product Lineup at GTC 2025 Nvidia, a key player in AI infrastructure, is focusing on increased predictability for its clients. This involves consistent product delivery, meeting performance expectations, and

Exploring the Capabilities of Google's Gemma 2 ModelsExploring the Capabilities of Google's Gemma 2 ModelsApr 22, 2025 am 11:26 AM

Google's Gemma 2: A Powerful, Efficient Language Model Google's Gemma family of language models, celebrated for efficiency and performance, has expanded with the arrival of Gemma 2. This latest release comprises two models: a 27-billion parameter ver

The Next Wave of GenAI: Perspectives with Dr. Kirk Borne - Analytics VidhyaThe Next Wave of GenAI: Perspectives with Dr. Kirk Borne - Analytics VidhyaApr 22, 2025 am 11:21 AM

This Leading with Data episode features Dr. Kirk Borne, a leading data scientist, astrophysicist, and TEDx speaker. A renowned expert in big data, AI, and machine learning, Dr. Borne offers invaluable insights into the current state and future traje

AI For Runners And Athletes: We're Making Excellent ProgressAI For Runners And Athletes: We're Making Excellent ProgressApr 22, 2025 am 11:12 AM

There were some very insightful perspectives in this speech—background information about engineering that showed us why artificial intelligence is so good at supporting people’s physical exercise. I will outline a core idea from each contributor’s perspective to demonstrate three design aspects that are an important part of our exploration of the application of artificial intelligence in sports. Edge devices and raw personal data This idea about artificial intelligence actually contains two components—one related to where we place large language models and the other is related to the differences between our human language and the language that our vital signs “express” when measured in real time. Alexander Amini knows a lot about running and tennis, but he still

Jamie Engstrom On Technology, Talent And Transformation At CaterpillarJamie Engstrom On Technology, Talent And Transformation At CaterpillarApr 22, 2025 am 11:10 AM

Caterpillar's Chief Information Officer and Senior Vice President of IT, Jamie Engstrom, leads a global team of over 2,200 IT professionals across 28 countries. With 26 years at Caterpillar, including four and a half years in her current role, Engst

New Google Photos Update Makes Any Photo Pop With Ultra HDR QualityNew Google Photos Update Makes Any Photo Pop With Ultra HDR QualityApr 22, 2025 am 11:09 AM

Google Photos' New Ultra HDR Tool: A Quick Guide Enhance your photos with Google Photos' new Ultra HDR tool, transforming standard images into vibrant, high-dynamic-range masterpieces. Ideal for social media, this tool boosts the impact of any photo,

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software