Beth Shirley Highlights IP Considerations for AI Tools in SHRM Online

Media Mention

Businesses around the world are having ongoing discussions about ways newly developed artificial intelligence tools can be used for a more efficient workplace, and Elizabeth B. Shirley, CIPP/US, CIPM was featured in an article by the Society of Human Resource Management (SHRM) detailing intellectual property issues to consider in those discussions.

"AI-generated works may qualify for copyright registration if they have sufficient human authorship to support a copyright claim," Shirley said. However, if people "merely use prompts to create AI-generated works, the content is likely not subject to copyright protection."

Employers should also consider the protection of their important trade secrets, which should be presumed to be collected by AI developers when input as a prompt. While it is one thing to mandate that employees do not input trade secrets, Shirley emphasized the importance of ensuring employees know what company information is considered confidential or a trade secret in order to enforce such a policy. "A more restrictive but conservative policy would be to prohibit any employee from using generative AI where that employee has access to confidential or proprietary information," she said.

Other uses of generative AI include (1) offering employees who have difficulty writing an accommodation or (2) assisting in drafting performance reviews, but Shirley warned both have significant drawbacks. While generative AI would be helpful to those with difficulty writing, the intellectual property and trade secret concerns might make the case that it is not a reasonable accommodation. And the risk of disclosing confidential information in a performance review may not be worth the risk.

For the full article, please click here.

Burr
Jump to Page

Contact Us

About Burr & Forman Cybersecurity & Data Privacy Law

Burr & Forman's experienced team helps clients navigate the complex cybersecurity and data privacy landscape with strategies designed to assess current risks, develop a corrective action plan, implement best practices, and provide immediate and appropriate responses to a cybersecurity breach.

We use cookies to improve your website experience, provide additional security, and remember you when you return to the website. This website does not respond to "Do Not Track" signals. By clicking "Accept," you agree to our use of cookies. To learn more about how we use cookies, please see our Privacy Policy.

Necessary Cookies

Necessary cookies enable core functionality such as security, network management, and accessibility. These cookies may only be disabled by changing your browser settings, but this may affect how the website functions.


Analytical Cookies

Analytical cookies help us improve our website by collecting and reporting information on its usage. We access and process information from these cookies at an aggregate level.