Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Artificial intelligence operations must involve ethical & responsible frameworks

By Diego Bartolome
artificial-intelligence-security-fp1170.jpg

Image via Freepik

September 2, 2022

Artificial intelligence (AI) weaves through the fabric of everyday lives, even among those unaware of how often they use the technology. Virtual digital assistants are in 110 million American homes, and driver-assisted technology functions in 100 million cars worldwide. AI-driven predictive text systems also assist countless people in writing on smart devices and computers. AI is everywhere, even if we do not realize it. 


As the use of AI expands, many consumers have started to wonder whether this technology and the companies operating it are adequately and ethically serving them. This has resulted in a heightened focus on how companies use customer data. For companies using AI-powered technology, protecting customers is not only ethical, but it also makes business sense, as it ultimately helps protect the organization. As a result, businesses using AI must act responsibly to protect their customers and bottom lines.

 

To err is costly

AI adoption is growing steadily. An IBM-commissioned study shows that one-third of businesses globally are using it, and another 40% will be soon. Companies are mainly moving to AI and machine learning to improve reliability, boost customer experience and help build trust. These capabilities have also become valuable tools for real-time language translation.


Yet, in an average data breach, U.S. companies lose over $4 million, and these breaches are significantly more costly among organizations with no AI and automation security plan. If harm to their reputation doesn’t make them hyper-vigilant of data security, bottom line profit — or losses — must.

 

Demonstrate qualifications

To foster trust between companies and customers, organizations must do more than simply protect financial resources. Businesses must also actively seek and eliminate bias from automated tools that process customer data.


They can do this by reviewing technology before and during its implementation, regularly evaluating whether bias is present and correcting it via various techniques such as active learning, data cleaning and augmentation, and even rules. Even if all biases might not be eliminated entirely from AI systems that handle enormous amounts of intelligence, these measures will still prevent harmful consequences. 

 

Obtaining and maintaining security certifications also ensures that companies are committed to protecting the data they compile. Stringent regulations and certifications include GDPR, PCI, HIPAA, SOC, ISO 27001 and other security frameworks.


Compliance with these qualifications demonstrates a company’s ability to operate transparently and help outside companies assess the business’s IT capabilities.

 

The world is watching

The world’s largest and most recognizable brands that use AI and ML are laser-focused on responsible and ethical use of these tools. They demonstrate this by displaying their oversight structure for public review. Search engine giant Google has posted its policies for responsible AI use directly on its website.


In contrast, Microsoft has similarly published an extensive review of its advances in responsible AI research. When new services are released, an AI evaluation is carried out to ensure minimal risk, and services might be canceled if they are not used responsibly.

 

It behooves every company working with AI and ML in customer service to confront this topic directly and openly, if for no other reason than regulators are watching. The European Commission has prioritized AI policies and declares excellence and trust as the two overriding principles to maintain when implementing AI.


To further show the need for transparency in AI policy, domestic policy is being shaped at the federal level and state by state, with ethics, responsibility and privacy concerns at the forefront.

 

Where AI is headed

The public’s expectations for exemplary customer service grow daily, and businesses are turning to AI to achieve it. As a patchwork of companies adopt ethical and responsible AI frameworks, anticipation will grow among partnering businesses, aligned organizations and the public for more widespread implementation across industries. Interested parties will be looking to reduce biases in tech models and preserve data confidentiality and privacy. 

 

In the meantime, companies should involve senior leadership to review and adopt certifications, qualifications and training in their current operations that address these areas. They should also seek out and partner with businesses that already operate at these essential benchmarks.


When this is all done collectively, the AI policy will be responsible and ethical.

KEYWORDS: artificial intelligence (AI) risk management security management security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diego Bartolome is chief technology officer at Language I/O, with 16 years of experience at the intersection of language, computers and technology, assisting companies in communicating in spoken languages. Formerly with Microsoft specializing in cognitive services, Bartolome holds a bachelor’s degree in management and business and master’s and doctorate degrees in electrical engineering. Find him on LinkedIn and Twitter.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • artificial intelligence

    95% of businesses concerned about ethical risks of artificial intelligence initiatives

    See More
  • Creating the GSOC: 4 Leading Examples of Successful Security Operations Centers

    Why automation, artificial intelligence and machine learning are becoming increasingly critical for SOC operations

    See More
  • crowd entrance security fp

    How artificial intelligence can transform event venue security operations

    See More

Related Products

See More Products
  • operations center.jpg

    Security Operations Center Guidebook

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing