AI Summit_Sept. 13 2024

INXNSKTWRFYNTS UWTGQJRX KWTR RZQYNUQJ INWJHYNTSX 8TRJ TK YMTXJ FHYX NSHQZIJ YMJ KTQQT\NSL

9MJ )NWJHYN[J TS 2JFXZWJX KTW F -NLM (TRRTS 1J[JQ TK (^GJWXJHZWNY^ &HWTXX YMJ :SNTS (NIS 2) 3.8 146 NX F KTQQT\ ZU WJLZQFYNTS YT NYX UWJIJHJXXTW 3.8 FSI \FX NSYWTIZHJI FX UFWY TK YMJ Ѧ5WT LWFR YT *SXZWJ 7JLZQFYTW^ *K ܪ HNJSH^ FSI 5JWKTWRFSHJ ѧ 3.8 FIIWJXXJX RFS^ TK YMJ HWNYNHNXRX TK 3.8 FSI NX RZHM GWTFIJW NS XHTUJ .S UFWYNHZQFW 3.8 ST\ NSHQZIJX RTWJ XJHYTWX XZHM FX UZGQNH FIRNSNXYWFYNTS .S FIINYNTS JIZHFYNTSFQ NSXYNYZYNTSX RF^ FQXT GJ HQFXXN ܪ JI FX HWNYNHFQ NSXYNYZ YNTSX ZSIJW HJWYFNS HNWHZRXYFSHJX UWT[NIJI YMJ^ HFWW^ TZY JXXJSYNFQ WJXJFWHM FHYN[NYNJX )JUJSI NSL TS YMJ HWNYNHFQNY^ TK YMJ XJHYTW F INXYNSHYNTS NX ST\ RFIJ GJY\JJS ѢJXXJSYNFQѣ FSI ѢNRUTWYFSYѣ NSXYNYZYNTSX 9MJXJ NSHQZIJ FQQ NSXYNYZYNTSX YMFY JRUQT^ RTWJ YMFS UJTUQJ TW MF[J FS FSSZFQ YZWST[JW TW GFQFSHJ XMJJY YTYFQ TK RTWJ YMFS ӏ RNQQNTS .WWJXUJHYN[J TK \MJYMJW YMJ YMWJXMTQI is met, public administration bodies involved in defense, national security, public safety, or law JSKTWHJRJSY FWJ J]UQNHNYQ^ J]HQZIJI 3.8 NRUTXJX HTRUWJMJSXN[J RJFXZWJX FSI TGQNLFYNTSX NSHQZINSL YJHMSNHFQ TUJWFYNTSFQ FSI TWLFSN_FYNTSFQ WJVZNWJRJSYX 9MJ RJFXZWJX FNR YT NIJSYNK^ FSI WJIZHJ WNXPX YT YMJ XJHZWNY^ TK YMJ SJY\TWP FSI .9 X^XYJRX 9MJ FNR NX YT WJIZHJ YMJ NRUFHY TK XJHZWNY^ NSHNIJSYX TS YMNWI UFWYNJX *]FRUQJX TK RJFXZWJX NSHQZIJ

• The creation of risk management plans • Measures to manage security incidents, • Measures to ensure the security of the supply chain, • Measures to maintain business operations, • Crisis management measures, and • -TQINSL HTRUFS^ INWJHYTWX FHHTZSY able Digital Services Act and Member State Laws

Disinformation Stops With You

Investigate the Issue Search other reliable sources to see what they are saying about the issue. A thorough search will help make sure you that you are sharing accurate information. Don’t share content if it isn’t from a credible source or you can’t find another credible source to confirm it. Learn more at www.cisa.gov/mdm-resource-library

9MJ )NLNYFQ 8JW[NHJX &HY )8& 147 is the cor SJWXYTSJ TK YMJ *ZWTUJFS :SNTSѣX INLNYFQ XJ HZWNY^ FWHMNYJHYZWJ .YX UZWUTXJ NX YT IJ ܪ SJ FSI MFWRTSN_J YMJ WZQJX LT[JWSNSL UWT[NI ers’ activities of various digital services in YMJ *: 9MJ )8& FQXT NRUTXJX TGQNLFYNTSX on platforms that act as intermediaries and connect consumers to goods, services, and HTSYJSY 9MJ TGQNLFYNTSX FWJ LWFIZFYJI FH HTWINSL YT YMJ XN_J TK YMJ HTRUFSNJXџYMJ most stringent obligations apply to massive TSQNSJ UQFYKTWRX ;145 FSI JSTWRTZX TS QNSJ XJFWHM JSLNSJX ;148* \NYM RTWJ YMFS RNQQNTS F[JWFLJ RTSYMQ^ FHYN[J ZXJWX The primary obligations arising from the )8& FWJ YT HWJFYJ F XFKJ INLNYFQ JS[NWTSRJSY free of illegal content, to improve transpar ency and accountability of digital interme

Is the Source Credible? Look at the site’s “About” page to see whether it includes detailed information, such as its values, ownership, location, funding, and contact information.

What are Fact Checkers Saying? It’s easy to believe things that confirm our views. If a claim seems too good to be true, see whether a trustworthy fact-checking organization has evaluated it and provided additional context.

What are Credible Sources Saying? Search the issue on trustworthy sites. If the facts reported by credible sources don’t align with the content you’re reviewing, don’t share it.

Is Your Investigation Neutral? Make sure you are using unbiased search language and remain open-minded to evidence that might contradict your beliefs.

Does it Provoke a Strong Reaction? If the content makes you feel shocked, angry, or sad, consider that its purpose may be to get you to respond emotionally and share it without confirming its accuracy.

Does it Acknowledge Other Perspectives? Most hot-button issues are complicated. Although all authors have their own viewpoint, credible sources will recognize other perspectives and provide factual context around the issue.

The Cybersecurity and Infrastructure Security Agency (CISA) produced this graphic to highlight tactics used by disinformation campaigns that seek to disrupt critical infrastructure in the United States. CISA’s publication of information materials about this issue are intended for public awareness, and are not intended to restrict, diminish, or demean any person’s right to hold, express, or publish any opinion or belief, including opinions or beliefs that align with those of a foreign government, are expressed by a foreign government-backed campaign, or dissent from the majority.

146 https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32022L2555&qid=1707423907665. 147 https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32022R2065&from=DE.

23 Data Mining, Algorithms, and Deep Fakes AI Roundtable Page 179

Made with FlippingBook Digital Publishing Software