Securiti Ranked #1 DSPM Vendor by GigaOm

View

Article 10: Data and Data Governance | EU AI Act

Contributors

Anas Baig

Product Marketing Manager at Securiti

Syed Tatheer Kazmi

Associate Data Privacy Analyst, Securiti

CIPP/Europe

Article 10 of the AI Act sheds light on the use of data as well as other aspects surrounding data governance by organizations subject to this Act.

All training, validation, and testing datasets will be subject to the relevant data governance and management practices. These practices will concern:

  • Appropriate design choices;
  • Overall data collection processes, data origin, and for personal data the purpose of data collection;
  • The formulation of assumptions, in particular with respect to the information that the data are supposed to measure and represent;
  • Relevant data-preparation processes such as annotation, labeling, cleaning, updating, enrichment, and aggregation;
  • Appropriate assessment of the availability, quantity, and suitability of the required data sets;
  • Evaluation of the possible biases that may impact the health and safety of natural persons in addition to their fundamental rights or lead to discrimination prohibited under Union law;
  •  Appropriate measures adopted to detect, prevent, and mitigate possible identified biases;
  • Appropriate identification of data gaps that may prevent compliance with the AI Act's provisions and development strategies to addressed;

All training, validation, and testing data sets must be relevant, sufficiently representative, error-free, and complete to ensure the output generated by these datasets is fit for the intended use. The datasets must also be sufficiently representative of the geographical, contextual, behavioral, or functional setting within which the high-risk AI system is expected to be used.

In cases where processing is necessary for purposes of bias detection and correction, providers of high-risk AI systems may exceptionally proceed with processing special categories of personal data with adequate protections for the fundamental rights and freedoms of individuals. However, in addition to the relevant requirements for such processing under GDPR , Directive (EU) 2016/680, and Regulation (EU) 2018/1725, all of the following conditions should be met:

  • The bias detection and correction cannot be carried out with synthetic or anonymized data;
  • The special categories of personal data are subject to technical limitations in terms of re-use of the personal data as well as several privacy-related measures;
  • The special categories of personal data are subject to appropriate measures to ensure all data processed is secured, protected, and authenticated via suitable safeguards;
  • The special categories of personal data will not be transmitted, transferred, or accessible to other parties;
  • The special categories of personal data must be deleted once the bias has been corrected or has reached the end of its retention period, whichever comes first;
  • The record of processing activities (RoPA) should contain the reasons why processing special categories of personal data was necessary to detect and correct biases and why alternative data could not achieve this objective.

Rejoignez notre newsletter

Recevez toutes les dernières informations, les mises à jour de la loi et plus encore dans votre boîte de réception


Partager

Videos

Spotlight Talks

Latest

View More

Securiti Accelerates Secure Agentic AI Deployments with NVIDIA Enterprise AI Factory

Still adapting to  the initial Gen AI boom, the IT industry is now undergoing another profound evolution- the rise of Agentic AI. AI has...

Identify Toxic Combinations of Risks View More

Identify Toxic Combinations of Risks: Detect & Prioritize Alerts Intelligently

Enterprise security teams navigate a complex security stack, relying on a diverse suite of specialized yet siloed security tools. Picture a typical enterprise SOC...

Understanding Data Regulations in Australia’s Telecom Sector View More

Understanding Data Regulations in Australia’s Telecom Sector

1. Introduction Australia’s telecommunications sector plays a crucial role in connecting millions of people. However, with this connectivity comes the responsibility of safeguarding vast...

Understanding Saudi Arabia’s Global AI Hub Law View More

Understanding Saudi Arabia’s Global AI Hub Law

Gain insights into Saudi Arabia’s Global AI Hub Law - a legal framework for operating various types of data centers referred to as Hubs....

ROPA View More

Records of Processing Activities (RoPA): A Cross-Jurisdictional Analysis

Download the whitepaper to gain a cross-jurisdictional analysis of records of processing activities (RoPA). Learn what RoPA is, why organizations should maintain it, and...

Managing Privacy Risks in Large Language Models (LLMs) View More

Managing Privacy Risks in Large Language Models (LLMs)

Download the whitepaper to learn how to manage privacy risks in large language models (LLMs). Gain comprehensive insights to avoid violations.

Comparison of RoPA Field Requirements Across Jurisdictions View More

Comparison of RoPA Field Requirements Across Jurisdictions

Download the infographic to compare Records of Processing Activities (RoPA) field requirements across jurisdictions. Learn its importance, penalties, and how to navigate RoPA.

Navigating Kenya’s Data Protection Act View More

Navigating Kenya’s Data Protection Act: What Organizations Need To Know

Download the infographic to discover key details about navigating Kenya’s Data Protection Act and simplify your compliance journey.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New