SlideShare a Scribd company logo
1 of 1
Download to read offline
GAI Testing, Incident DB, Rapid Response Teams, and USAISIā€™s Role
I believe that it will be essential to create a public GAI Incident Database. This Database should include ID of GAI software, Description of software,
Incident Description, Status of Repair, Testing Results, Risk Evaluation, and Warnings. This will be invaluable to potential users of the GAI software. It
is essential to evaluate the potential risks associated with the incidents and track the status of
fi
xes. There should be a mandate to report serious
incidents (de
fi
nition needed) with deployed systems. Regulatory responses should be de
fi
ned for high risk incidents. Only a neutral organization (e.g.
U.S. Arti
fi
cial Intelligence Safety Institute Consortium) with large resources and access to expert evaluators and red teams will be able to maintain a
large incident database, determine risks, and validate
fi
xes.
All organizations involved with the Generative AI application delivery process should have rapid response teams for
fi
xing problems discovered in
post-deployment testing and use. As incidents are discovered in an organizationā€™s deployed applications, the organizationā€™s rapid response team
should be required to report the status of
fi
xes to a regulatory agency in a timely fashion to avoid being penalized (e.g decerti
fi
cation of application for
unresolved serious incidents, criminal penalties for deliberate illegal errors ). The time allowed for
fi
xes should be based on the seriousness of the
problem.
The diagram below is a basic illustration of Post-deployment Testing combined with an Incident Database and Rapid Response
fi
xes under the
supervision of a regulatory organization.
Description of Process: The GAI Deliverable Producer creates deliverables (e.g. input data, foundation model,
fi
ne-tuned model, applications, or output
data). Hopefully they use the AI RMF guidelines for pre-deployment testing and then release the deliverables. Post-deployment testing could be done
by the recipient and/or an independent red team. If the post-deployment testing or use of the deliverables detects an incident, it is sent to the incident
database and the Rapid Response team of the GAI Deliverable Producer. A regulatory agency (e.g. USA AI Safety Institute) evaluates the risk
associated with the incident and attaches a warning. The Rapid Response Team is responsible for producing a
fi
x for the incident problem in a timely
fashion depending on the risk level. The USA AI Safety Institute tracks the status of the
fi
x and can take action (e.g. penalties, deliverable
decerti
fi
cation) if the
fi
x is signi
fi
cantly delayed.

More Related Content

Similar to Gen AI Regulation and USAISI.pdf

Forging Partnerships Between Auditors and Security Managers
Forging Partnerships Between Auditors and Security ManagersForging Partnerships Between Auditors and Security Managers
Forging Partnerships Between Auditors and Security Managersamiable_indian
Ā 
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaIso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaiFour Consultancy
Ā 
MATH215 Introduction To Analysis.docx
MATH215 Introduction To Analysis.docxMATH215 Introduction To Analysis.docx
MATH215 Introduction To Analysis.docxstirlingvwriters
Ā 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-SessionRyan Faircloth
Ā 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesRyan Faircloth
Ā 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxtienboileau
Ā 
Webinar: Get Ready to Detect, Respond &Ā Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond &Ā Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond &Ā Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond &Ā Recover from a Cyber AttackAujas
Ā 
Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Samuel Loomis
Ā 
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET Journal
Ā 
Ecfirstbiz
EcfirstbizEcfirstbiz
Ecfirstbizshailu devi
Ā 
Ecfirstbiz
EcfirstbizEcfirstbiz
Ecfirstbizshailu devi
Ā 
3895SafeAssign Originality ReportComputer Sec.docx
3895SafeAssign Originality ReportComputer Sec.docx3895SafeAssign Originality ReportComputer Sec.docx
3895SafeAssign Originality ReportComputer Sec.docxlorainedeserre
Ā 
The uncool-security-hygiene
The uncool-security-hygieneThe uncool-security-hygiene
The uncool-security-hygieneThiagu Haldurai
Ā 
Web Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management FrameworkWeb Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management Frameworkjpubal
Ā 
Phases of Penetration Testing
Phases of Penetration TestingPhases of Penetration Testing
Phases of Penetration TestingKiwiQA
Ā 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxstilliegeorgiana
Ā 
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...IJERDJOURNAL
Ā 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013Bee_Ware
Ā 

Similar to Gen AI Regulation and USAISI.pdf (20)

Forging Partnerships Between Auditors and Security Managers
Forging Partnerships Between Auditors and Security ManagersForging Partnerships Between Auditors and Security Managers
Forging Partnerships Between Auditors and Security Managers
Ā 
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaIso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in india
Ā 
MATH215 Introduction To Analysis.docx
MATH215 Introduction To Analysis.docxMATH215 Introduction To Analysis.docx
MATH215 Introduction To Analysis.docx
Ā 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
Ā 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
Ā 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docx
Ā 
Webinar: Get Ready to Detect, Respond &Ā Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond &Ā Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond &Ā Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond &Ā Recover from a Cyber Attack
Ā 
Security assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP PrepSecurity assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP Prep
Ā 
Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016
Ā 
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep Learning
Ā 
Ecfirstbiz
EcfirstbizEcfirstbiz
Ecfirstbiz
Ā 
Ecfirstbiz
EcfirstbizEcfirstbiz
Ecfirstbiz
Ā 
3895SafeAssign Originality ReportComputer Sec.docx
3895SafeAssign Originality ReportComputer Sec.docx3895SafeAssign Originality ReportComputer Sec.docx
3895SafeAssign Originality ReportComputer Sec.docx
Ā 
The uncool-security-hygiene
The uncool-security-hygieneThe uncool-security-hygiene
The uncool-security-hygiene
Ā 
Web Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management FrameworkWeb Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management Framework
Ā 
Phases of Penetration Testing
Phases of Penetration TestingPhases of Penetration Testing
Phases of Penetration Testing
Ā 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Ā 
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
Ā 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
Ā 
Ffiec cat may_2017
Ffiec cat may_2017Ffiec cat may_2017
Ffiec cat may_2017
Ā 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
Ā 
Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)
Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)
Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)Wonjun Hwang
Ā 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
Ā 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
Ā 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
Ā 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
Ā 
Nellā€™iperspazio con Rocket: il Framework Web di Rust!
Nellā€™iperspazio con Rocket: il Framework Web di Rust!Nellā€™iperspazio con Rocket: il Framework Web di Rust!
Nellā€™iperspazio con Rocket: il Framework Web di Rust!Commit University
Ā 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
Ā 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
Ā 
Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...
Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...
Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...Patryk Bandurski
Ā 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
Ā 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
Ā 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
Ā 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
Ā 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
Ā 
"Subclassing and Composition ā€“ A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition ā€“ A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition ā€“ A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition ā€“ A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
Ā 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
Ā 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
Ā 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
Ā 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Ā 
Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)
Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)
Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)
Ā 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Ā 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
Ā 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Ā 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Ā 
Nellā€™iperspazio con Rocket: il Framework Web di Rust!
Nellā€™iperspazio con Rocket: il Framework Web di Rust!Nellā€™iperspazio con Rocket: il Framework Web di Rust!
Nellā€™iperspazio con Rocket: il Framework Web di Rust!
Ā 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Ā 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
Ā 
Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...
Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...
Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...
Ā 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Ā 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
Ā 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Ā 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Ā 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Ā 
"Subclassing and Composition ā€“ A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition ā€“ A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition ā€“ A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition ā€“ A Pythonic Tour of Trade-Offs", Hynek Schlawack
Ā 
Hot Sexy call girls in Panjabi Bagh šŸ” 9953056974 šŸ” Delhi escort Service
Hot Sexy call girls in Panjabi Bagh šŸ” 9953056974 šŸ” Delhi escort ServiceHot Sexy call girls in Panjabi Bagh šŸ” 9953056974 šŸ” Delhi escort Service
Hot Sexy call girls in Panjabi Bagh šŸ” 9953056974 šŸ” Delhi escort Service
Ā 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Ā 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Ā 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
Ā 

Gen AI Regulation and USAISI.pdf

  • 1. GAI Testing, Incident DB, Rapid Response Teams, and USAISIā€™s Role I believe that it will be essential to create a public GAI Incident Database. This Database should include ID of GAI software, Description of software, Incident Description, Status of Repair, Testing Results, Risk Evaluation, and Warnings. This will be invaluable to potential users of the GAI software. It is essential to evaluate the potential risks associated with the incidents and track the status of fi xes. There should be a mandate to report serious incidents (de fi nition needed) with deployed systems. Regulatory responses should be de fi ned for high risk incidents. Only a neutral organization (e.g. U.S. Arti fi cial Intelligence Safety Institute Consortium) with large resources and access to expert evaluators and red teams will be able to maintain a large incident database, determine risks, and validate fi xes. All organizations involved with the Generative AI application delivery process should have rapid response teams for fi xing problems discovered in post-deployment testing and use. As incidents are discovered in an organizationā€™s deployed applications, the organizationā€™s rapid response team should be required to report the status of fi xes to a regulatory agency in a timely fashion to avoid being penalized (e.g decerti fi cation of application for unresolved serious incidents, criminal penalties for deliberate illegal errors ). The time allowed for fi xes should be based on the seriousness of the problem. The diagram below is a basic illustration of Post-deployment Testing combined with an Incident Database and Rapid Response fi xes under the supervision of a regulatory organization. Description of Process: The GAI Deliverable Producer creates deliverables (e.g. input data, foundation model, fi ne-tuned model, applications, or output data). Hopefully they use the AI RMF guidelines for pre-deployment testing and then release the deliverables. Post-deployment testing could be done by the recipient and/or an independent red team. If the post-deployment testing or use of the deliverables detects an incident, it is sent to the incident database and the Rapid Response team of the GAI Deliverable Producer. A regulatory agency (e.g. USA AI Safety Institute) evaluates the risk associated with the incident and attaches a warning. The Rapid Response Team is responsible for producing a fi x for the incident problem in a timely fashion depending on the risk level. The USA AI Safety Institute tracks the status of the fi x and can take action (e.g. penalties, deliverable decerti fi cation) if the fi x is signi fi cantly delayed.