search
HomeTechnology peripheralsAI'Basic Security Requirements for Generative Artificial Intelligence Services' is open for comment

'Basic Security Requirements for Generative Artificial Intelligence Services' is open for comment

Oct 12, 2023 pm 05:37 PM
generative artificial intelligenceService securitybasic requirements

IT Home News on October 12, according to the official website of the National Information Security Standardization Technical Committee, the technical document "Basic Requirements for Generative Artificial Intelligence Service Security" (hereinafter referred to as the "Requirements") organized by the committee was released on October 11 A draft for solicitation of opinions was formed on October 25, and the technical document is now open to the public for solicitation of opinions. If you have any comments or suggestions, please provide feedback before 24:00 on October 25.

Basic Security Requirements for Generative Artificial Intelligence Services is open for comment

The "Requirements" provide the basic security requirements for generative artificial intelligence services, including corpus security, model security, security measures, security assessment, etc. Applicable to the provision of generative artificial intelligence services to the public in my country The provider improves the security level of the service, or the provider conducts a security assessment on its own or entrusts a third party to conduct a security assessment. It can also provide relevant authorities with the ability to evaluate the security level of generative artificial intelligence services in order to rewrite it without changing the original intention. Content, the language needs to be rewritten to Chinese.

Basic Security Requirements for Generative Artificial Intelligence Services is open for comment

Image source Pexels

IT House’s organizing requirements are as follows:

  • Establish a blacklist of corpus sources, and data from blacklist sources must not be used for training.
  • Security assessments should be conducted on each source corpus. If the content of a single source corpus contains more than 5% of illegal and harmful information, it should be added to the blacklist.
  • When using corpus containing personal information, the authorization and consent of the corresponding personal information subject should be obtained, or other conditions for the legal use of the personal information should be met.
  • When using corpus containing biometric information such as faces, the written authorization and consent of the corresponding personal information subject should be obtained, or other conditions for the legal use of the biometric information should be met.
  • The annotators should be assessed by themselves, those who pass the test should be given annotation qualifications, and there should be a mechanism for regular retraining and assessment, as well as a mechanism for suspending or canceling the annotation qualifications when necessary.
  • During the training process, the security of the generated content should be one of the main considerations for evaluating the quality of the generated results.
  • Those who provide services through an interactive interface should disclose the following information to the public in a prominent position such as the homepage of the website:

The content that needs to be rewritten is: -Applicable people, occasions, purposes and other information

-Third-party base model usage.

  • The necessity, applicability and safety of applying generative artificial intelligence in various fields within the service scope should be fully demonstrated.

According to previous reports from IT House, seven departments including the Cyberspace Administration of China, the National Development and Reform Commission, the Ministry of Education, the Ministry of Science and Technology, the Ministry of Industry and Information Technology, the Ministry of Public Security, and the State Administration of Radio and Television issued the "Interim Provisions on Generative Artificial Intelligence Service Management" on July 10. Measures", which will be implemented on August 15

The "Measures" stipulate that you must not take advantage of algorithms, data, platforms, etc. to implement monopoly and unfair competition; you must not endanger the physical and mental health of others, and you must not infringe other people's portrait rights, reputation rights, honor rights, privacy rights and personal information rights; Effective measures should be taken to enhance the transparency of generative artificial intelligence services and improve the accuracy and reliability of generated content.

In order to rewrite the content without changing the original meaning, the language needs to be rewritten to Chinese

The above is the detailed content of 'Basic Security Requirements for Generative Artificial Intelligence Services' is open for comment. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:搜狐. If there is any infringement, please contact admin@php.cn delete
A Business Leader's Guide To Generative Engine Optimization (GEO)A Business Leader's Guide To Generative Engine Optimization (GEO)May 03, 2025 am 11:14 AM

Google is leading this shift. Its "AI Overviews" feature already serves more than one billion users, providing complete answers before anyone clicks a link.[^2] Other players are also gaining ground fast. ChatGPT, Microsoft Copilot, and Pe

This Startup Is Using AI Agents To Fight Malicious Ads And Impersonator AccountsThis Startup Is Using AI Agents To Fight Malicious Ads And Impersonator AccountsMay 03, 2025 am 11:13 AM

In 2022, he founded social engineering defense startup Doppel to do just that. And as cybercriminals harness ever more advanced AI models to turbocharge their attacks, Doppel’s AI systems have helped businesses combat them at scale— more quickly and

How World Models Are Radically Reshaping The Future Of Generative AI And LLMsHow World Models Are Radically Reshaping The Future Of Generative AI And LLMsMay 03, 2025 am 11:12 AM

Voila, via interacting with suitable world models, generative AI and LLMs can be substantively boosted. Let’s talk about it. This analysis of an innovative AI breakthrough is part of my ongoing Forbes column coverage on the latest in AI, including

May Day 2050: What Have We Left To Celebrate?May Day 2050: What Have We Left To Celebrate?May 03, 2025 am 11:11 AM

Labor Day 2050. Parks across the nation fill with families enjoying traditional barbecues while nostalgic parades wind through city streets. Yet the celebration now carries a museum-like quality — historical reenactment rather than commemoration of c

The Deepfake Detector You've Never Heard Of That's 98% AccurateThe Deepfake Detector You've Never Heard Of That's 98% AccurateMay 03, 2025 am 11:10 AM

To help address this urgent and unsettling trend, a peer-reviewed article in the February 2025 edition of TEM Journal provides one of the clearest, data-driven assessments as to where that technological deepfake face off currently stands. Researcher

Quantum Talent Wars: The Hidden Crisis Threatening Tech's Next FrontierQuantum Talent Wars: The Hidden Crisis Threatening Tech's Next FrontierMay 03, 2025 am 11:09 AM

From vastly decreasing the time it takes to formulate new drugs to creating greener energy, there will be huge opportunities for businesses to break new ground. There’s a big problem, though: there’s a severe shortage of people with the skills busi

The Prototype: These Bacteria Can Generate ElectricityThe Prototype: These Bacteria Can Generate ElectricityMay 03, 2025 am 11:08 AM

Years ago, scientists found that certain kinds of bacteria appear to breathe by generating electricity, rather than taking in oxygen, but how they did so was a mystery. A new study published in the journal Cell identifies how this happens: the microb

AI And Cybersecurity: The New Administration's 100-Day ReckoningAI And Cybersecurity: The New Administration's 100-Day ReckoningMay 03, 2025 am 11:07 AM

At the RSAC 2025 conference this week, Snyk hosted a timely panel titled “The First 100 Days: How AI, Policy & Cybersecurity Collide,” featuring an all-star lineup: Jen Easterly, former CISA Director; Nicole Perlroth, former journalist and partne

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

mPDF

mPDF

mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool