Understanding AI Risks and Mitigation
- 11 topics | 45m
- Up to 30 languages
- Transcripts
It should come as no surprise the impact generative AI has had and will have in our immediate future. While its potential is unlimited, there are still a lot of unknowns. One thing we do know is that it has many inherent risks, from copyright issues to the potential for accidental data leaks and reinforcement of biases and stereotypes. To help prevent harms associated with these risks, individuals and companies alike must be aware of the risks and acknowledge the gaps and challenges. In this course, you will be introduced to the functionality and capabilities of AI systems, and the risks associated with them. You will learn about risks in the areas of privacy and cybersecurity, intellectual property, trade secrets, information currency and accuracy, and other ethical considerations when using generative AI.The course was developed and reviewed with subject matter support provided by certified subject matter experts and industry professionals. Please note, the course materials and content were current with the laws and regulations at the time of the last expert review. However, they may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation with respect to compliance with legal statutes or requirements.
IN THIS COURSE
-
Understanding AI Risks and Mitigation
-
Introduction to AI9m
-
Knowledge Check: Introduction to AI2m
-
Privacy and Cybersecurity Risks6m
-
Knowledge Check: Privacy and Cybersecurity Risks1m
-
Copyright Infringement & Disclosure of Trade Secrets7m
-
Knowledge Check: Copyrights & Trade Secrets1m
-
Recency, Delusions, and Accuracy of Information5m
-
Knowledge Check: Recency, Delusions & Accuracy1m
-
Ethical Risks of AI5m
-
Knowledge Check: Ethical Risks of AI2m
YOU MIGHT ALSO LIKE
COMPLIANCE-COURSE
GDPR Short: Selling or Sharing Data (UK)
COMPLIANCE-COURSE
Supply Chain Short: Supply Chain Due Diligence
COMPLIANCE-COURSE
Cybersecurity Short: Proper Use of E-mail