FPF_APAC_GenAI_A4_Digital_R5_-_2025_Update
[…] reliable. Notably, the Interim Response acknowledges that many of the submissions received by the Australian Government focused on new risks posed by generative AI, including emerging ‘ frontier models.’ Based on these submissions, the Interim Response identifies potential harms from AI systems and organizes them according to the three different stages of the AI […]
FPF_Confidential_Computing_Digital_R3_-_2025_Update
[…] to process the data (” in use”). See Strong Data Encryption Protects Everyone, Future of Privacy Forum (Jul. 9, 2020), https://fpf.org/encryption-infographic/. 8 See Confidential Computing – The Next Frontier in Data Security, Confidential Computing Consortium, Oct. 2021, p. 13, https:// confidentialcomputing.io/wp-content/uploads/sites/10/2023/03/Everest_G roup_-_Confidential_Computing_-_The_Next_Frontier_in_Data_ Security_-_2021-10-19.pdf (last accessed Jun. 21, 2024) (“[o]ver 75% of demand is driven by […]
FPF_Confidential_Computing_PRINT_R1_-_2025_Update_wBleed
[…] the data (” in use”). See Strong Data Encryption Protects Everyone , Future of Privacy Forum (Jul. 9, 2020), https://fpf.org/encryption-infographic/ . 8 See Confidential Computing – The Next Frontier in Data Security, Confidential Computing Consortium , Oct. 2021, p. 13, https:// confidentialcomputing.io/wp-content/uploads/sites/10/2023/03/Everest_G roup_-_Confidential_Computing_-_The_Next_Frontier_in_Data_Security_-_2021-10-19.pdf (last accessed Jun. 21, 2024) (“[o]ver 75% of demand is driven by […]
FPF_Confidential_Computing_PRINT_R1_-_2025_Update
[…] the data (” in use”). See Strong Data Encryption Protects Everyone , Future of Privacy Forum (Jul. 9, 2020), https://fpf.org/encryption-infographic/ . 8 See Confidential Computing – The Next Frontier in Data Security, Confidential Computing Consortium , Oct. 2021, p. 13, https:// confidentialcomputing.io/wp-content/uploads/sites/10/2023/03/Everest_G roup_-_Confidential_Computing_-_The_Next_Frontier_in_Data_Security_-_2021-10-19.pdf (last accessed Jun. 21, 2024) (“[o]ver 75% of demand is driven by […]
TENE_Final
[…] Omer Tene & Jules Polonetsky, A Theory of Creepy: Technology, Privacy and Shifting Social Norms, 16 YALE J.L. & TECH. 59, 61 (2013). 80 Bots, the Next Frontier, ECONOMIST (Apr. 9, 2016), http://www.economist.com/news/business-and-finance/21696477-market-apps-maturing-now-one-text-based-services-or-chatbots-looks-poised/. 81 In his classic 1970 article, The Uncanny Valley, Tokyo Institute of Technology robotics professor Masahiro Mori envisioned that people’s reactions […]
Minding Mindful Machines: AI Agents and Data Protection Considerations
[…] Erik Schluntz and Barry Zhang, Anthropic “[S]ystems where LLMs dynamically direct their own processes and tool usage, maintaining control over how they accomplish tasks.” “Navigating the AI Frontier: A Primer on the Evolution and Impact of AI Agents,” Dec. 2024, Larsen et al., World Economic Forum and Capgemini “[A]n entity that senses percepts (sound, […]
FPF Unveils Report on Emerging Trends in U.S. State AI Regulation
[…] approach to mitigating specific AI risks across various proposals and laws. The report also discusses alternative approaches focused on particular technologies, such as generative artificial intelligence and frontier or foundation models. In this Report, we highlight the following: State lawmakers are primarily focusing on governing AI used in consequential decisions that significantly impact individuals’ […]
867d56ae-cd8e-4713-98f9-b6556247409c
[…] spoke those words at all — the voice was generated through artificial intelligence(AI) technology, and is maybe the first major example of what may become the next frontier ofpolitical campaign tools and tactics in the 2024 elections and beyond.While generative AI can be used for good in elections, including to inform and educate voters, […]
FPF Confidential Computing R3
[…] to process the data (” in use”). See Strong Data Encryption Protects Everyone, Future of Privacy Forum (Jul. 9, 2020), https://fpf.org/encryption-infographic/. 8 See Confidential Computing – The Next Frontier in Data Security, Confidential Computing Consortium, Oct. 2021, p. 13, https:// confidentialcomputing.io/wp-content/uploads/sites/10/2023/03/Everest_G roup_-_Confidential_Computing_-_The_Next_Frontier_in_Data_ Security_-_2021-10-19.pdf (last accessed Jun. 21, 2024) (“[o]ver 75% of demand is driven by […]
FPF_APAC_GenAI_A4_Digital_Appendix_R4
[…] reliable. Notably, the Interim Response acknowledges that many of the submissions received by the Australian Government focused on new risks posed by generative AI, including emerging ‘ frontier models.’ Based on these submissions, the Interim Response identifies potential harms from AI systems and organizes them according to the three different stages of the AI […]