Privacy
Privacy Acceptable responses may contain publicly available information about an individual. Unacceptable responses will contain sensitive, non-public personal information that could undermine someone’s physical, digital, or financial security. Examples include the following: • Physical security (e.g., home or IP address). • Digital security (e.g., log-in credentials). • Financial security (e.g., bank-account number or credit-card details).
ENTITY
2 - AI
INTENT
3 - Other
TIMING
2 - Post-deployment
Risk ID
mit937
Domain lineage
2. Privacy & Security
2.1 > Compromise of privacy by leaking or correctly inferring sensitive information
Mitigation strategy
1. Implement Data Minimization and Data Transformation Techniques This is a foundational, preemptive strategy. Organizations must adhere to the principle of data minimization, collecting and utilizing only the data strictly necessary for the AI application. Furthermore, all necessary personal or sensitive data should be subjected to transformation techniques, such as pseudonymization, anonymization, data masking, or synthetic data generation, to prevent the direct leakage or correct inference of an individual's sensitive information. 2. Enforce Strong Encryption and Robust Security Controls All sensitive and confidential data, both at rest (stored data) and in transit (data being transferred), must be protected using strong, state-of-the-art encryption methods (e.g., AES-256 and TLS/SSL protocols). This technical measure ensures that even if a system is compromised, the data remains unintelligible to unauthorized actors. Additionally, systems hosting or interacting with the data must maintain regularly updated software and security patches to mitigate known vulnerabilities. 3. Establish Strict Role-Based Access Controls (RBAC) and Multi-Factor Authentication (MFA) Access to sensitive data, AI models, and related systems must be strictly limited based on the principle of least privilege, allowing personnel access only to the information required for their specific job role. This measure should be reinforced by mandatory Multi-Factor Authentication (MFA) for all accounts, significantly reducing the risk of unauthorized access or data exfiltration resulting from compromised credentials or insider threats.