[LWVNM Action] Positions used to oppose AI and data centers?
Paul Stokes
stokescorrales at mac.com
Mon Aug 18 12:16:25 MDT 2025
Excellent points.
At the least, don’t put data centers in arid states like New Mexico. It may not be a problem for regions that have plenty of surface water; e.g., like the equivalent of adding a few thousand households for a data center.
Paul
> On Aug 17, 2025, at 9:39 PM, Elene via Action <action at mailman.swcp.com> wrote:
>
> Starlyn and all,
>
> I don't know what the precise position of LWVCNM should be, but there are very sound reasons to oppose the expansion of the huge data centers that are used to support AI (as well as to mine for crypto).
>
> Even as of a few years ago, data centers' heavy use of water for cooling was a growing issue:
> Data centers, backbone of the digital economy, face water scarcity and climate risk <https://www.npr.org/2022/08/30/1119938708/data-centers-backbone-of-the-digital-economy-face-water-scarcity-and-climate-ris>
>
>
> Data centers, backbone of the digital economy, face water scarcity and c...
> About 20% of data centers in the United States already rely on watersheds that are under moderate to high stress...
> <https://www.npr.org/2022/08/30/1119938708/data-centers-backbone-of-the-digital-economy-face-water-scarcity-and-climate-ris>
>
>
> And then there's the energy use:
> '“The demand for new data centers cannot be met in a sustainable way. The pace at which companies are building new data centers means the bulk of the electricity to power them must come from fossil fuel-based power plants,” says Bashir.'
>
> Explained: Generative AI’s environmental impact <https://news.mit.edu/2025/explained-generative-ai-environmental-impact-0117>
>
> Explained: Generative AI’s environmental impact
> MIT News explores the environmental and sustainability implications of generative AI technologies and applications.
> <https://news.mit.edu/2025/explained-generative-ai-environmental-impact-0117>
>
> Then there's the health-destroying noise, and the unethical tactics companies use to force data centers on communities:
> Opinion | Noisy, Hungry Data Centers Are Catching Communities by Surprise <https://www.nytimes.com/2024/09/15/opinion/data-centers-ai-amazon-google-microsoft.html?unlocked_article_code=1.fE8.0gsA.q9-KxXSOokWO&smid=url-share>
>
>
> Opinion | Noisy, Hungry Data Centers Are Catching Communities by Surprise
> Residents rarely learn how data centers and their noise and energy and water use may affect their lives until it...
> <https://www.nytimes.com/2024/09/15/opinion/data-centers-ai-amazon-google-microsoft.html?unlocked_article_code=1.fE8.0gsA.q9-KxXSOokWO&smid=url-share>
>
>
> Elene Gusch
>
>
>
>
> On Sunday, August 17, 2025 at 08:23:43 PM MDT, Richard Mason via Action <action at mailman.swcp.com> wrote:
>
>
> These are positions from other states.
>
> Dick
>
> On Sunday, August 17, 2025 at 05:34:12 PM MDT, Starlyn Brown <sbrown at unm.edu> wrote:
>
>
> Why is the assumption that we are opposing AI and Data Centers? These are complicated topics and saying we oppose both is irresponsible. I can understand opposing harmful and deceptive uses of AI. However, to say we oppose data centers?
>
> Starlyn
>
> ________________________________________
> From: Action <action-bounces at mailman.swcp.com <mailto:action-bounces at mailman.swcp.com>> on behalf of Richard Mason via Action <action at mailman.swcp.com <mailto:action at mailman.swcp.com>>
> Sent: Sunday, August 17, 2025 10:46 AM
> To: LWVNM Action
> Cc: Richard Mason
> Subject: [LWVNM Action] Fw: Positions used to oppose AI and data centers?
>
> [EXTERNAL]
> This is from the LWVUS Action Chairs discussion group
>
> Dick Mason
>
> ----- Forwarded Message -----
> From: Jean Pierce <advocacy at lwvor.org <mailto:advocacy at lwvor.org>>
> To: Jean Pierce <advocacy at lwvor.org <mailto:advocacy at lwvor.org>>
> Sent: Sunday, August 17, 2025 at 10:15:36 AM MDT
> Subject: Positions used to oppose AI and data centers?
>
> Hi all,
> Jennifer Muroff is asking what positions you use to oppose AI and data centers:
>
> Are any of your states are working on bills related to
> 1) AI and 2) opposing data centers?
>
> If so, do you use positions on the environment? MA has a regulatory hearing coming up and she would like to submit public comment.
>
> MA supported a deepfake AI images in elections bill and we used the elections and voting positions.
>
> I told Jennifer that Oregon uses a position which we created several years ago:
>
> Privacy and Cybersecurity - Adopted: January 2021; Amended January 2021
>
> Cybersecurity is the prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation. This position statement addresses Elections, Information Security, Personal Information Protection, and Electronic Business and Social Media.
>
>
>
> Elections Security
>
> The election process is the foundation of our representative form of government. Election integrity, accuracy, transparency, and trustworthiness require vigilance to ensure security protections. Security requirements include and are not limited to:
>
> * verifiable ballots;
>
> * ballots that can be recounted and audited;
>
> * up-to-date hardware and software, supported by vendors, tested, and secure;
>
> * protected voter registration databases;
>
> * election staff/volunteers with cybersecurity expertise;
>
> * cyber-damage contingency plans;
>
> * risk-limiting audits;
>
> * attention to disinformation and misleading ads.
>
> *
>
> Protect voters’ ability to exercise an informed opinion on electoral matters. Explore limiting the unfettered electronic circulation and amplification of election misinformation (e.g., targeted disinformation campaigns, manipulated media, anonymous disinformation, and algorithmic and robotic disinformation campaigns).
>
> Information Security
>
> Government, individuals, and organizations (including the private sector and critical infrastructure), all require strong cybersecurity protections and effective deterrents to assure national security, economic and social stability, and personal information integrity.
>
> * Create consistent information privacy laws and regulations across all organizations (government, private, for-profit, and non-profit) that eliminate gaps, inconsistencies, and overlaps.
>
> * Regulate all technology-enabled organizations (e.g., internet platforms, online intermediaries, business-to-consumer platforms), not shifting sectors, so that organizations are subject to a uniform set of laws and regulations.
>
> * Regulate all categories of information in the same way, regardless of the type of organization or sector that collects that information.
>
> * Apply a baseline set of regulations to all types of information, regardless of the type of organization or sector collecting that information.
>
> * Apply regulatory requirements to organizations according to their size and complexity, the nature of data covered, and the risk posed by exposing private information.
>
> * All information (including third-party data transfers) needs sufficiently flexible protections to address emerging technologies and scientific evidence while serving the common good by balancing the demands of stakeholders and vested interests.
>
>
>
> The ubiquitous information and communication technologies (ICT) of today’s pervasive digital services, platforms, and marketplaces require a global governance perspective to address their societal and economic impacts:
>
>
>
> * Harmonize laws and regulations across jurisdictions to protect individuals and assure the trustworthy flow of information across all boundaries—government, organizations, industry sectors, states, and countries.
>
> * Aim to develop flexible regulatory structures that can quickly adapt to social and scientific realities and technical and economic policy challenges.
>
> * Use forward-looking, collaborative mechanisms such as experimentation and learning, test-and-evolve, and post-doc effectiveness reviews. Incentivize specific outcomes that facilitate anticipating and adapting to rapid changes.
>
>
>
> State laws that become inconsistent with future comprehensive federal privacy standards may be preempted, while more stringent laws may remain. At a minimum, citizens' information protection rights should be comparable to those of citizens around the world—both current and future protections that may be established. Current European Council personal information protections include the ability to:
>
> * be informed of what personal information is held and why
>
> * access information held by an entity
>
> * request updating or correcting of information
>
> * request manual processing in lieu of automated or algorithmic processing
>
> * request transfer of information to another entity
>
> * withdraw prior consent to process data or object to specific situation consent
>
> * request deleting personal information.
>
>
>
> Personal Information Protection
>
> Uniform privacy rights need to protect personal privacy and prevent known harm.
>
> * Establish uniform information protections for personal and behavioral data that can be linked to an individual or devices.
>
> * Prevent harmful uses of personal information by all information processors who collect, store, analyze, transfer, sell, etc.
>
> * Expand the legal definition of “harm” to include physical, monetary, reputational, intangible, future, or other substantial injuries and to provide individuals the right to legal remedy.
>
> * Assure that personal information collection, use, transfer, and disclosure for economic or societal purposes is consistent with the purpose for which individuals provide their data, and does not cause them harm.
>
> * Shift the focus of information protection from individual self-management when submitting data (e.g., opt-in, obscure notice, and choice disclosures) to organizational stewardship in protecting individuals’ personal privacy.
>
> * Expand personal information privacy definition to address rapidly changing information and communication technologies, accelerated networking between businesses, and automated collection and dissemination of data, which together subvert personally identifiable information, de-identification, re-identification, and data anonymization.
>
>
>
>
>
> Electronic Business and Social Media: Cybersecurity Responsibilities
>
> Organizations conducting electronic business and social media commercializing personal information both bear the responsibility for protecting information and must be liable for failure to protect individuals from harm.
>
> All organizations--including third-party receivers:
>
> * Must protect individuals’ transferred information across multiple organizations to ensure end-use accountability.
>
> * Have a duty to safely collect, use, and share personal, sensitive information.
>
> * Should use comprehensive information risk assessments, take proactive measures to implement information security measures, and be held accountable for fulfilling these risk management obligations.
>
> * Are held accountable for misuse of personal information by strengthening both state and federal laws, rule-making, and enforcement powers.
>
>
>
> We support the right of free speech for all. The digital tools of information and communication technology (such as algorithms and artificial intelligence) can selectively distort or amplify user-generated content. The resulting disinformation, digital manipulation, false claims, and/or privacy violations may endanger society or harm others.
>
> * Compel private internet communication platforms (applications, social media, websites, etc.) to be responsible for moderating content.
>
> * Define liability for damages and provide for enforcement for failure to moderate content.
>
> <https://lwvor.org/full-lwvor-position-index#back-to-top>
>
>
> --
> Jean Pierce
> Action Committee Chair
> League of Women Voters of Oregon
> 630-269-8563
> Advocacy at lwvor.org <mailto:Advocacy at lwvor.org><mailto:Advocacy at lwvor.org>
>
> _______________________________________________
> Action mailing list
> Action at mailman.swcp.com <mailto:Action at mailman.swcp.com>
> https://mailman.swcp.com/cgi-bin/mailman/listinfo/action
> _______________________________________________
> Action mailing list
> Action at mailman.swcp.com
> https://mailman.swcp.com/cgi-bin/mailman/listinfo/action
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.swcp.com/pipermail/action/attachments/20250818/5eee904d/attachment-0001.htm>
More information about the Action
mailing list