These are positions from other states.

Dick

On Sunday, August 17, 2025 at 05:34:12 PM MDT, Starlyn Brown <sbrown@unm.edu> wrote:


Why is the assumption that we are opposing AI and Data Centers? These are complicated topics and saying we oppose both is irresponsible. I can understand opposing harmful and deceptive uses of AI.  However, to say we oppose data centers?

Starlyn

________________________________________
From: Action <action-bounces@mailman.swcp.com> on behalf of Richard Mason via Action <action@mailman.swcp.com>
Sent: Sunday, August 17, 2025 10:46 AM
To: LWVNM Action
Cc: Richard Mason
Subject: [LWVNM Action] Fw: Positions used to oppose AI and data centers?

  [EXTERNAL]
This is from the LWVUS Action Chairs discussion group

Dick Mason

----- Forwarded Message -----
From: Jean Pierce <advocacy@lwvor.org>
To: Jean Pierce <advocacy@lwvor.org>
Sent: Sunday, August 17, 2025 at 10:15:36 AM MDT
Subject: Positions used to oppose AI and data centers?

Hi all,
Jennifer Muroff is asking what positions you use to oppose AI and data centers:

Are any of your  states are working on bills related to
1) AI and 2) opposing data centers?

If so, do you use positions on the environment? MA has a regulatory hearing coming up and she would like to submit public comment.

MA supported a deepfake AI images in elections bill and we used the elections and voting positions.

I told Jennifer that Oregon uses a position which we created several years ago:

Privacy and Cybersecurity - Adopted: January 2021; Amended January 2021

Cybersecurity is the prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation. This position statement addresses Elections, Information Security, Personal Information Protection, and Electronic Business and Social Media.



Elections Security

The election process is the foundation of our representative form of government. Election integrity, accuracy, transparency, and trustworthiness require vigilance to ensure security protections. Security requirements include and are not limited to:

  *  verifiable ballots;

  *  ballots that can be recounted and audited;

  *  up-to-date hardware and software, supported by vendors, tested, and secure;

  *  protected voter registration databases;

  *  election staff/volunteers with cybersecurity expertise;

  *  cyber-damage contingency plans;

  *  risk-limiting audits;

  *  attention to disinformation and misleading ads.

  *

Protect voters’ ability to exercise an informed opinion on electoral matters.  Explore limiting the unfettered electronic circulation and amplification of election misinformation (e.g., targeted disinformation campaigns, manipulated media, anonymous disinformation, and algorithmic and robotic disinformation campaigns).

Information Security

Government, individuals, and organizations (including the private sector and critical infrastructure), all require strong cybersecurity protections and effective deterrents to assure national security, economic and social stability, and personal information integrity.

  *  Create consistent information privacy laws and regulations across all organizations (government, private, for-profit, and non-profit) that eliminate gaps, inconsistencies, and overlaps.

  *  Regulate all technology-enabled organizations (e.g., internet platforms, online intermediaries, business-to-consumer platforms), not shifting sectors, so that organizations are subject to a uniform set of laws and regulations.

  *  Regulate all categories of information in the same way, regardless of the type of organization or sector that collects that information.

  *  Apply a baseline set of regulations to all types of information, regardless of the type of organization or sector collecting that information.

  *  Apply regulatory requirements to organizations according to their size and complexity, the nature of data covered, and the risk posed by exposing private information.

  *  All information (including third-party data transfers) needs sufficiently flexible protections to address emerging technologies and scientific evidence while serving the common good by balancing the demands of stakeholders and vested interests.



The ubiquitous information and communication technologies (ICT) of today’s pervasive digital services, platforms, and marketplaces require a global governance perspective to address their societal and economic impacts:



  *  Harmonize laws and regulations across jurisdictions to protect individuals and assure the trustworthy flow of information across all boundaries—government, organizations, industry sectors, states, and countries.

  *  Aim to develop flexible regulatory structures that can quickly adapt to social and scientific realities and technical and economic policy challenges.

  *  Use forward-looking, collaborative mechanisms such as experimentation and learning, test-and-evolve, and post-doc effectiveness reviews. Incentivize specific outcomes that facilitate anticipating and adapting to rapid changes.



State laws that become inconsistent with future comprehensive federal privacy standards may be preempted, while more stringent laws may remain. At a minimum, citizens' information protection rights should be comparable to those of citizens around the world—both current and future protections that may be established. Current European Council personal information protections include the ability to:

  *  be informed of what personal information is held and why

  *  access information held by an entity

  *  request updating or correcting of information

  *  request manual processing in lieu of automated or algorithmic processing

  *  request transfer of information to another entity

  *  withdraw prior consent to process data or object to specific situation consent

  *  request deleting personal information.



Personal Information Protection

Uniform privacy rights need to protect personal privacy and prevent known harm.

  *  Establish uniform information protections for personal and behavioral data that can be linked to an individual or devices.

  *  Prevent harmful uses of personal information by all information processors who collect, store, analyze, transfer, sell, etc.

  *  Expand the legal definition of “harm” to include physical, monetary, reputational, intangible, future, or other substantial injuries and to provide individuals the right to legal remedy.

  *  Assure that personal information collection, use, transfer, and disclosure for economic or societal purposes is consistent with the purpose for which individuals provide their data, and does not cause them harm.

  *  Shift the focus of information protection from individual self-management when submitting data (e.g., opt-in, obscure notice, and choice disclosures) to organizational stewardship in protecting individuals’ personal privacy.

  *  Expand personal information privacy definition to address rapidly changing information and communication technologies, accelerated networking between businesses, and automated collection and dissemination of data, which together subvert personally identifiable information, de-identification, re-identification, and data anonymization.





Electronic Business and Social Media: Cybersecurity Responsibilities

Organizations conducting electronic business and social media commercializing personal information both bear the responsibility for protecting information and must be liable for failure to protect individuals from harm.

All organizations--including third-party receivers:

  *  Must protect individuals’ transferred information across multiple organizations to ensure end-use accountability.

  *  Have a duty to safely collect, use, and share personal, sensitive information.

  *  Should use comprehensive information risk assessments, take proactive measures to implement information security measures, and be held accountable for fulfilling these risk management obligations.

  *  Are held accountable for misuse of personal information by strengthening both state and federal laws, rule-making, and enforcement powers.



We support the right of free speech for all. The digital tools of information and communication technology (such as algorithms and artificial intelligence) can selectively distort or amplify user-generated content. The resulting disinformation, digital manipulation, false claims, and/or privacy violations may endanger society or harm others.

  *  Compel private internet communication platforms (applications, social media, websites, etc.) to be responsible for moderating content.

  *  Define liability for damages and provide for enforcement for failure to moderate content.

<https://lwvor.org/full-lwvor-position-index#back-to-top>


--
Jean Pierce
Action Committee Chair
League of Women Voters of Oregon
630-269-8563
Advocacy@lwvor.org
<mailto:Advocacy@lwvor.org>