chapter five
5 Privacy
This chapter covers
- When GenAI privacy fails in practice.
- Four pillars of data protection in GenAI
- Practical steps to reduce risks in each pillar
- How deployment posture changes privacy risks
- What evidence regulators look for
Privacy is often equated with security, but good security is not sufficient for good privacy. Encrypting data and locking it behind access controls keeps it safe from data breaches. Privacy therefore requires good security (confidentiality and integrity are essential. However, privacy goes further. It defines the rules for collection, use, storage, sharing, and deletion, and it makes sure individuals remain in control. It governs what you are allowed to do with the data even in a secure environment. It is about lawfulness, fairness, and control for the individual.
Good privacy often requires (among others):