{"id":229241,"date":"2024-07-17T13:56:41","date_gmt":"2024-07-17T11:56:41","guid":{"rendered":"https:\/\/silicon-saxony.de\/bitkom-how-ai-can-be-used-without-violating-data-protection\/"},"modified":"2024-07-17T13:56:41","modified_gmt":"2024-07-17T11:56:41","slug":"bitkom-how-ai-can-be-used-without-violating-data-protection","status":"publish","type":"post","link":"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/","title":{"rendered":"Bitkom: How AI can be used without violating data protection"},"content":{"rendered":"<p><img decoding=\"async\" style=\"width: 25%;\" src=\"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2024\/07\/bitkom-logo-400x300_3_TEXT.jpg\"><\/p>\n<p>&#8220;There is still a lot of uncertainty surrounding the use of AI. To ensure that Germany does not fall behind when it comes to artificial intelligence, what is needed above all is more clarity and certainty in dealing with the legal requirements,&#8221; says Susanne Dehmel, member of the Bitkom Executive Board.<\/p>\n<p>The guide begins with a brief definition of when AI can be distinguished from traditional software and which laws may be relevant to the use of AI. The comprehensive second part classifies the key provisions of the European General Data Protection Regulation and their significance when using AI &#8211; from transparency and information obligations to data protection impact assessments. This chapter also discusses what content an internal company policy on the use of AI must contain. A practical example from the automotive industry is then used to illustrate once again how AI can be implemented in a company in compliance with data protection regulations. The guide concludes with two detailed checklists for the training of in-house AI models and the use of third-party AI systems. With their help, those responsible in companies can proceed step by step to ensure that the use of AI complies with data protection regulations.<\/p>\n<p>The practical guide &#8220;Artificial intelligence and data protection&#8221; is available for free download at: www.bitkom.org\/Bitkom\/Publications\/KI-Datenschutz-Praxisleitfaden<\/p>\n<p>&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; <\/p>\n<h4 class=\"\">Further links<\/h4>\n<p>\ud83d\udc49 <a href=\"http:\/\/www.bitkom.org\" target=\"_blank\" rel=\"noopener\">www.bitkom.org<\/a>&nbsp; <br \/><a href=\"http:\/\/www.bitkom.org\/Bitkom\/Publikationen\/KI-Datenschutz-Praxisleitfaden\" target=\"_blank\" rel=\"noopener\">\ud83d\udc49 Practical guide &#8220;Artificial intelligence and data protection&#8221;<\/a>&nbsp; <\/p>\n<p>Photo: pixabay<\/p>\n","protected":false},"excerpt":{"rendered":"<p>July 12, 2024. Many companies are hesitant to use AI for fear of violating data protection laws. In a Bitkom survey, 70 percent of all companies and even 80 percent of companies that use AI see data protection violations as the greatest risk when using AI. And 62% believe that AI services in the cloud cannot be reconciled with data protection regulations. A new practical guide &#8220;Artificial intelligence and data protection&#8221; from the digital association Bitkom, which is now available to download free of charge, sheds light on how AI can be used in companies in compliance with data protection regulations and which legal provisions need to be observed.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[4764],"tags":[4759,1942,2043],"class_list":["post-229241","post","type-post","status-publish","format-standard","hentry","category-software-en","tag-artificial-intelligence-ai","tag-data-security","tag-digitalization"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bitkom: How AI can be used without violating data protection - Silicon Saxony<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bitkom: How AI can be used without violating data protection - Silicon Saxony\" \/>\n<meta property=\"og:description\" content=\"July 12, 2024. Many companies are hesitant to use AI for fear of violating data protection laws. In a Bitkom survey, 70 percent of all companies and even 80 percent of companies that use AI see data protection violations as the greatest risk when using AI. And 62% believe that AI services in the cloud cannot be reconciled with data protection regulations. A new practical guide &quot;Artificial intelligence and data protection&quot; from the digital association Bitkom, which is now available to download free of charge, sheds light on how AI can be used in companies in compliance with data protection regulations and which legal provisions need to be observed.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Silicon Saxony\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-17T11:56:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2024\/07\/bitkom-logo-400x300_3_TEXT.jpg\" \/>\n<meta name=\"author\" content=\"publizer2silisax\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"publizer2silisax\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/\"},\"author\":{\"name\":\"publizer2silisax\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/098cd473f5dd7707320dd1e252e15ac6\"},\"headline\":\"Bitkom: How AI can be used without violating data protection\",\"datePublished\":\"2024-07-17T11:56:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/\"},\"wordCount\":252,\"image\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2024\/07\/bitkom-logo-400x300_3_TEXT.jpg\",\"keywords\":[\"Artificial Intelligence (AI)\",\"Data Security\",\"Digitalization\"],\"articleSection\":[\"Software\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/\",\"url\":\"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/\",\"name\":\"Bitkom: How AI can be used without violating data protection - Silicon Saxony\",\"isPartOf\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2024\/07\/bitkom-logo-400x300_3_TEXT.jpg\",\"datePublished\":\"2024-07-17T11:56:41+00:00\",\"author\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/098cd473f5dd7707320dd1e252e15ac6\"},\"breadcrumb\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/#primaryimage\",\"url\":\"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2024\/07\/bitkom-logo-400x300_3_TEXT.jpg\",\"contentUrl\":\"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2024\/07\/bitkom-logo-400x300_3_TEXT.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/silicon-saxony.de\/en\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bitkom: How AI can be used without violating data protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/#website\",\"url\":\"https:\/\/silicon-saxony.de\/en\/\",\"name\":\"Silicon Saxony\",\"description\":\"Germany&#039;s Hightech Network - Semiconductors, Software, Robotics\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/silicon-saxony.de\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/098cd473f5dd7707320dd1e252e15ac6\",\"name\":\"publizer2silisax\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4acbd63e28aa0bc7909adc90d5ef38c3fdb5e4c7922782d8eca389d00ffbd0d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4acbd63e28aa0bc7909adc90d5ef38c3fdb5e4c7922782d8eca389d00ffbd0d?s=96&d=mm&r=g\",\"caption\":\"publizer2silisax\"},\"url\":\"https:\/\/silicon-saxony.de\/en\/author\/publizer2silisax\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bitkom: How AI can be used without violating data protection - Silicon Saxony","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/","og_locale":"en_US","og_type":"article","og_title":"Bitkom: How AI can be used without violating data protection - Silicon Saxony","og_description":"July 12, 2024. Many companies are hesitant to use AI for fear of violating data protection laws. In a Bitkom survey, 70 percent of all companies and even 80 percent of companies that use AI see data protection violations as the greatest risk when using AI. And 62% believe that AI services in the cloud cannot be reconciled with data protection regulations. A new practical guide \"Artificial intelligence and data protection\" from the digital association Bitkom, which is now available to download free of charge, sheds light on how AI can be used in companies in compliance with data protection regulations and which legal provisions need to be observed.","og_url":"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/","og_site_name":"Silicon Saxony","article_published_time":"2024-07-17T11:56:41+00:00","og_image":[{"url":"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2024\/07\/bitkom-logo-400x300_3_TEXT.jpg","type":"","width":"","height":""}],"author":"publizer2silisax","twitter_card":"summary_large_image","twitter_misc":{"Written by":"publizer2silisax","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/#article","isPartOf":{"@id":"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/"},"author":{"name":"publizer2silisax","@id":"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/098cd473f5dd7707320dd1e252e15ac6"},"headline":"Bitkom: How AI can be used without violating data protection","datePublished":"2024-07-17T11:56:41+00:00","mainEntityOfPage":{"@id":"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/"},"wordCount":252,"image":{"@id":"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2024\/07\/bitkom-logo-400x300_3_TEXT.jpg","keywords":["Artificial Intelligence (AI)","Data Security","Digitalization"],"articleSection":["Software"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/","url":"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/","name":"Bitkom: How AI can be used without violating data protection - Silicon Saxony","isPartOf":{"@id":"https:\/\/silicon-saxony.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/#primaryimage"},"image":{"@id":"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2024\/07\/bitkom-logo-400x300_3_TEXT.jpg","datePublished":"2024-07-17T11:56:41+00:00","author":{"@id":"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/098cd473f5dd7707320dd1e252e15ac6"},"breadcrumb":{"@id":"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/#primaryimage","url":"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2024\/07\/bitkom-logo-400x300_3_TEXT.jpg","contentUrl":"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2024\/07\/bitkom-logo-400x300_3_TEXT.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/silicon-saxony.de\/en\/bitkom-how-ai-can-be-used-without-violating-data-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/silicon-saxony.de\/en\/home\/"},{"@type":"ListItem","position":2,"name":"Bitkom: How AI can be used without violating data protection"}]},{"@type":"WebSite","@id":"https:\/\/silicon-saxony.de\/en\/#website","url":"https:\/\/silicon-saxony.de\/en\/","name":"Silicon Saxony","description":"Germany&#039;s Hightech Network - Semiconductors, Software, Robotics","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/silicon-saxony.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/098cd473f5dd7707320dd1e252e15ac6","name":"publizer2silisax","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4acbd63e28aa0bc7909adc90d5ef38c3fdb5e4c7922782d8eca389d00ffbd0d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4acbd63e28aa0bc7909adc90d5ef38c3fdb5e4c7922782d8eca389d00ffbd0d?s=96&d=mm&r=g","caption":"publizer2silisax"},"url":"https:\/\/silicon-saxony.de\/en\/author\/publizer2silisax\/"}]}},"_links":{"self":[{"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/posts\/229241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/comments?post=229241"}],"version-history":[{"count":0,"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/posts\/229241\/revisions"}],"wp:attachment":[{"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/media?parent=229241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/categories?post=229241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/tags?post=229241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}