Skip to content

Menu

Network by SubjectChannelsBlogsHomeAboutContact
AI Legal Journal logo
Subscribe
Search
Close
PublishersBlogsNetwork by SubjectChannels
Subscribe

Best Practices for Securing Data Used to Train and Operate AI Systems

By Odia Kagan on May 28, 2025
Email this postTweet this postLike this postShare this post on LinkedIn

The National Security Agency’s Artificial Intelligence, Security Center (AISC), together with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the New Zealand’s Government Communications Security Bureau’s National Cyber Security Centre (NCSC-NZ), and the United Kingdom’s National Cyber Security Centre (NCSC-UK), recently published an informational guide with a brief overview of the AI system lifecycle and general best practices necessary to secure data used during the development, testing, and operation of AI-based systems.

These best practices include the incorporation of techniques such as data encryption, digital signatures, data provenance tracking, secure storage and trust infrastructure. It is modeled after the National Institute of Standards and Technology (NIST) AI framework.

You can read more here.

  • Posted in:
    Privacy & Data Security
  • Blog:
    Privacy Compliance & Data Security
  • Organization:
    Fox Rothschild LLP
  • Article: View Original Source

LexBlog logo
Copyright © 2025, LexBlog. All Rights Reserved.
Legal content Portal by LexBlog LexBlog Logo