Domain
stringclasses
3 values
Subdomain
stringclasses
23 values
Indicator
stringlengths
5
57
Definition
stringlengths
32
233
Notes
stringlengths
98
990
Reference_1
stringlengths
23
106
Reference_2
stringlengths
19
132
Link_1
stringlengths
32
163
Link_2
stringlengths
23
146
Upstream
Data
Data size
For the data used in building the model, is the data size disclosed?
Data size should be reported in appropriate units (e.g. bytes, words, tokens, images, frames) and broken down by modality. Data size should be reported to a precision of one significant figure (e.g. 4 trillion tokens, 200 thousand images). No form of decomposition into data phases is required.
Data Statements for Natural Language Processing: Toward Mitigating System Bias and Enabling Better Science
Datasheets for Datasets
https://direct.mit.edu/tacl/article/doi/10.1162/tacl_a_00041/43452/Data-Statements-for-Natural-Language-Processing
https://arxiv.org/abs/1803.09010
Upstream
Data
Data sources
For all data used in building the model, are the data sources disclosed?
To receive this point, a meaningful decomposition of sources must be listed in an understandable way (e.g. named URLs/domains/databases/data providers). It does not suffice to say data is “sourced from the Internet" or comes from "licensed sources”.
Datasheets for Datasets
Towards Accountability for Machine Learning Datasets: Practices from Software Engineering and Infrastructure
https://arxiv.org/abs/1803.09010
https://arxiv.org/abs/2010.13561
Upstream
Data
Data creators
For all data used in building the model, is there some characterization of the people who created the data?
While information about data creators may not be easily discernible for some data scraped from the web, the general sources (URLs/domains) should be listed, and, for other data that is bought, licensed, or collected, a reasonable attempt at characterizing the underlying people who provided the data is required to receive this point. The relevant properties of people can vary depending on context: for example, relevant properties could include demographic information like fraction of Black individuals contributing to the dataset, geographic information like fraction of European individuals contributing to the dataset, language information like fraction of L1 English speakers, or occupational information like the fraction of professional artists.
Datasheets for Datasets
Towards Accountability for Machine Learning Datasets: Practices from Software Engineering and Infrastructure
https://arxiv.org/abs/1803.09010
https://arxiv.org/abs/2010.13561
Upstream
Data
Data source selection
Are the selection protocols for including and excluding data sources disclosed?
Selection protocols refer to procedures used to choose which datasets or subsets of datasets will be used to build a model. We will award this point even if the selection protocols are non-exhaustive.
Datasheets for Datasets
Towards Accountability for Machine Learning Datasets: Practices from Software Engineering and Infrastructure
https://arxiv.org/abs/1803.09010
https://arxiv.org/abs/2010.13561
Upstream
Data
Data curation
For all data sources, are the curation protocols for those data sources disclosed?
Curation protocols refer to steps taken to further modify data sources, such as procedures to manage, annotate, and organize data. The aims of curation might include improving the quality, relevance, and representativeness of the data. We will award this point if the developer reports that it does not perform any further curation beyond the data sources.
Datasheets for Datasets
Towards Accountability for Machine Learning Datasets: Practices from Software Engineering and Infrastructure
https://arxiv.org/abs/1803.09010
https://arxiv.org/abs/2010.13561
Upstream
Data
Data augmentation
Are any steps the developer takes to augment its data sources disclosed?
Such steps might include augmenting data sources with synthetic data. We will award this point if the developer reports that it does not take any steps to augment its data.
Datasheets for Datasets
Towards Accountability for Machine Learning Datasets: Practices from Software Engineering and Infrastructure
https://arxiv.org/abs/1803.09010
https://arxiv.org/abs/2010.13561
Upstream
Data
Harmful data filtration
If data is filtered to remove harmful content, is there a description of the associated filter?
Such harmful content might relate to violence or child sexual abuse material. We will award this point if the developer reports that it does not perform any harmful data filtration.
Documenting Large Webtext Corpora: A Case Study on the Colossal Clean Crawled Corpus
A Pretrainer's Guide to Training Data: Measuring the Effects of Data Age, Domain Coverage, Quality, & Toxicity
https://aclanthology.org/2021.emnlp-main.98/
https://arxiv.org/abs/2305.13169
Upstream
Data
Copyrighted data
For all data used in building the model, is the associated copyright status disclosed?
To receive this point, the copyright status (e.g. copyrighted, public domain) must relate to some decomposition of the data. We will award this point if there is some meaningful decomposition of the data, even if the decomposition is insufficient to receive the Data Creators point or if the disclosure is not comprehensive relative to legal copyright standards.
Addressing "Documentation Debt" in Machine Learning Research: A Retrospective Datasheet for BookCorpus
Machine Learning and Artificial Intelligence: Legal Concepts
https://arxiv.org/abs/2105.05241
https://genlaw.github.io/glossary.html#legal-concepts
Upstream
Data
Data license
For all data used in building the model, is the associated license status disclosed?
To receive this point, the license status must relate to some decomposition of the data. We will award this point if there is some meaningful decomposition of the data, even if the decomposition is insufficient to receive the Data Creators point.
Addressing "Documentation Debt" in Machine Learning Research: A Retrospective Datasheet for BookCorpus
Machine Learning and Artificial Intelligence: Legal Concepts
https://arxiv.org/abs/2105.05241
https://genlaw.github.io/glossary.html#legal-concepts
Upstream
Data
Personal information in data
For all data used in building the model, is the inclusion or exclusion of personal information in that data disclosed?
To receive this point, the disclosure of personal information must relate to some decomposition of the data. We will award this point if there is some meaningful decomposition of the data, even if the decomposition is insufficient to receive the Data Creators point. Additionally, we will award this point if the developer reports the inclusion of personal information, independent of if and how they mitigate related privacy concerns.
Data Capitalism: Redefining the Logics of Surveillance and Privacy
What Does it Mean for a Language Model to Preserve Privacy?
https://journals.sagepub.com/doi/10.1177/0007650317718185
https://arxiv.org/abs/2202.05520
Upstream
Data labor
Use of human labor
Are the phases of the data pipeline where human labor is involved disclosed?
Phases of the data pipeline that involve human labor include activities and tasks performed by people to collect, annotate, clean, or validate data. This indicator is inclusive of all data that is created by or on behalf of the developer. We will award this point if the developer gives a reasonable best-effort description of the use of human labor in their data pipeline.
The future of crowd work
AI Is a Lot of Work: As the technology becomes ubiquitous, a vast tasker underclass is emerging — and not going anywhere
https://dl.acm.org/doi/10.1145/2441776.2441923
https://www.theverge.com/features/23764584/ai-artificial-intelligence-data-notation-labor-scale-surge-remotasks-openai-chatbots
Upstream
Data labor
Employment of data laborers
Is the organization that directly employs the people involved in data labor disclosed for each phase of the data pipeline?
Phases of the data pipeline that involve human labor include activities and tasks performed by people to collect, annotate, clean, or validate data. This indicator is inclusive of all data that is created by or on behalf of the developer. We will award this point if the developer provides the name of the organization that employs data laborers, even if other details about the employment relationship are not disclosed.
The future of crowd work
AI Is a Lot of Work: As the technology becomes ubiquitous, a vast tasker underclass is emerging — and not going anywhere
https://dl.acm.org/doi/10.1145/2441776.2441923
https://www.theverge.com/features/23764584/ai-artificial-intelligence-data-notation-labor-scale-surge-remotasks-openai-chatbots
Upstream
Data labor
Geographic distribution of data laborers
Is geographic information regarding the people involved in data labor disclosed for each phase of the data pipeline?
This indicator is inclusive of all data that is created by or on behalf of the developer. We will award this point if the developer gives a reasonable best-effort description of the geographic distribution of labor at the country-level.
Cleaning Up ChatGPT Takes Heavy Toll on Human Workers
Ghost Work: How to Stop Silicon Valley from Building a New Global Underclass
https://www.wsj.com/articles/chatgpt-openai-content-abusive-sexually-explicit-harassment-kenya-workers-on-human-workers-cf191483
https://ghostwork.info/
Upstream
Data labor
Wages
Are the wages for people who perform data labor disclosed?
This indicator is inclusive of data labor at all points of the model development process, such as training data annotation or red teaming data used to control the model. We will award this point if the developer reports that it does not compensate workers. For all data that is created by or on behalf of the developer,
The future of crowd work
AI Is a Lot of Work: As the technology becomes ubiquitous, a vast tasker underclass is emerging — and not going anywhere
https://dl.acm.org/doi/10.1145/2441776.2441923
https://www.theverge.com/features/23764584/ai-artificial-intelligence-data-notation-labor-scale-surge-remotasks-openai-chatbots
Upstream
Data labor
Instructions for creating data
Are the instructions given to people who perform data labor disclosed?
This indicator is inclusive of all data that is created by or on behalf of the developer. We will award this point if the developer makes a reasonable best-effort attempt to disclose instructions given to people who create data used to build the model for the bulk of the data phases involving human labor.
Everyone wants to do the model work, not the data work
The future of crowd work
https://dl.acm.org/doi/10.1145/3411764.3445518
https://dl.acm.org/doi/10.1145/2441776.2441923
Upstream
Data labor
Labor protections
Are the labor protections for people who perform data labor disclosed?
This indicator is inclusive of data labor at all points of the model development process, such as training data annotation or red teaming data used to control the model. It is also inclusive of all data that is created by or on behalf of the developer. As an example, labor protections might include protocols to reduce the harm to workers' mental health stemming from exposure to violent content when annotating training data. We will award this point if the developer reports that it does not protect workers or if it does not use data laborers and therefore has no labor protections.
The Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence
Ghost Work: How to Stop Silicon Valley from Building a New Global Underclass
https://www.jstor.org/stable/j.ctv1ghv45t
https://ghostwork.info/
Upstream
Data labor
Third party partners
Are the third parties who were or are involved in the development of the model disclosed?
This indicator is inclusive of partnerships that go beyond data labor as there may be third party partners at various stages in the model development process. We will award this point if the developer reports that it was the sole entity involved in the development of the model.
The Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence
Ghost Work: How to Stop Silicon Valley from Building a New Global Underclass
https://www.jstor.org/stable/j.ctv1ghv45t
https://ghostwork.info/
Upstream
Data access
Queryable external data access
Are external entities provided with queryable access to the data used to build the model?
We will award this point for any reasonable mechanism for providing access: direct access to the data, an interface to query the data, a developer-mediated access program where developers can inspect requests, etc. Developers may receive this point even if there are rate-limits on the number of queries permitted to an external entity and restrictions on which external entities are given access, insofar as these limits and restrictions are transparent and ensure a reasonable amount of external access. We may accept justifications for prohibiting queries of specific parts of the data.
Datasheets for Datasets
The ROOTS Search Tool: Data Transparency for LLMs
https://arxiv.org/abs/1803.09010
https://arxiv.org/abs/2302.14035
Upstream
Data access
Direct external data access
Are external entities provided with direct access to the data used to build the model?
We will award this point if external entities can directly access the data without any form of gating from the developer. With that said, we may award this point if the developer provides justifications for prohibiting access to specific parts of the data or to unauthorized external entities.
Datasheets for Datasets
The ROOTS Search Tool: Data Transparency for LLMs
https://arxiv.org/abs/1803.09010
https://arxiv.org/abs/2302.14035
Upstream
Compute
Compute usage
Is the compute required for building the model disclosed?
Compute should be reported in appropriate units, which most often will be floating point operations (FLOPS). Compute should be reported to a precision of one significant figure (e.g. 5 x $10^{25}$ FLOPS). We will award this point even if there is no decomposition of the reported compute usage into compute phases, but it should be clear whether the reported compute usage is for a single model run or includes additional runs, or hyperparameter tuning, or training other models like reward models, or other steps in the model development process that necessitate compute expenditure.
Towards the Systematic Reporting of the Energy and Carbon Footprints of Machine Learning
Energy and Policy Considerations for Deep Learning in NLP
https://arxiv.org/abs/2002.05651
https://arxiv.org/abs/1906.02243
Upstream
Compute
Development duration
Is the amount of time required to build the model disclosed?
The continuous duration of time required to build the model should be reported in weeks, days, or hours to a precision of one significant figure (e.g. 3 weeks). No form of decomposition into phases of building the model is required for this indicator, but it should be clear what the duration refers to (e.g. training the model, training and subsequent evaluation and red teaming).
Compute Trends Across Three Eras of Machine Learning
Training Compute-Optimal Large Language Models
https://arxiv.org/abs/2202.05924
https://arxiv.org/abs/2203.15556
Upstream
Compute
Compute hardware
For the primary hardware used to build the model, is the amount and type of hardware disclosed?
In most cases, this indicator will be satisfied by information regarding the number and type of GPUs or TPUs used to train the model. The number of hardware units should be reported to a precision of one significant figure (e.g. 800 NVIDIA H100 GPUs). We will not award this point if (i) the training hardware generally used by the developer is disclosed, but the specific hardware for the given model is not, or (ii) the training hardware is disclosed, but the amount of hardware is not. We will award this point even if information about the interconnects between hardware units is not disclosed.
Compute Trends Across Three Eras of Machine Learning
Training Compute-Optimal Large Language Models
https://arxiv.org/abs/2202.05924
https://arxiv.org/abs/2203.15556
Upstream
Compute
Hardware owner
For the primary hardware used in building the model, is the owner of the hardware disclosed?
For example, the hardware owner may be the model developer in the case of a self-owned cluster, a cloud provider like Microsoft Azure, Google Cloud Platform, or Amazon Web Services, or a national supercomputer. In the event that hardware is owned by multiple sources or is highly decentralized, we will award this point if a developer makes a reasonable effort to describe the distribution of hardware owners.
Compute Trends Across Three Eras of Machine Learning
Training Compute-Optimal Large Language Models
https://arxiv.org/abs/2202.05924
https://arxiv.org/abs/2203.15556
Upstream
Compute
Energy usage
Is the amount of energy expended in building the model disclosed?
Energy usage should be reported in appropriate units, which most often will be megawatt-hours (mWh). Energy usage should be reported to a precision of one significant figure (e.g. 500 mWh). No form of decomposition into compute phases is required, but it should be clear whether the reported energy usage is for a single model run or includes additional runs, or hyperparameter tuning, or training other models like reward models, or other steps in the model development process that necessitate energy usage.
Quantifying the Carbon Emissions of Machine Learning
Carbon Emissions and Large Neural Network Training
https://arxiv.org/abs/1910.09700
https://arxiv.org/abs/2104.10350
Upstream
Compute
Carbon emissions
Is the amount of carbon emitted (associated with the energy used) in building the model disclosed?
Emissions should be reported in appropriate units, which most often will be tons of carbon dioxide emitted (tCO2). Emissions should be reported to a precision of one significant figure (e.g. 500 tCO2). No form of decomposition into compute phases is required, but it should be clear whether the reported emissions is for a single model run or includes additional runs, or hyperparameter tuning, or training other models like reward models, or other steps in the model development process that generate emissions.
Quantifying the Carbon Emissions of Machine Learning
Carbon Emissions and Large Neural Network Training
https://arxiv.org/abs/1910.09700
https://arxiv.org/abs/2104.10350
Upstream
Compute
Broader environmental impact
Are any broader environmental impacts from building the model besides carbon emissions disclosed?
While the most direct environmental impact of building a foundation model is the energy used and, therefore, the potential carbon emissions, there may be other environmental impacts. For example, these may include the use of other resources such as water for cooling data centers or metals for producing specialized hardware. We recognize that there does not exist an authoritative or consensus list of broader environmental factors. For this reason, we will award this point if there is a meaningful, though potentially incomplete, discussion of broader environmental impact.
Counting Carbon: A Survey of Factors Influencing the Emissions of Machine Learning
Energy and Policy Considerations for Deep Learning in NLP
https://arxiv.org/abs/2302.08476
https://arxiv.org/abs/1906.02243
Upstream
Methods
Model stages
Are all stages in the model development process disclosed?
Stages refer to each identifiable step that constitutes a substantive change to the model during the model building process. We recognize that different developers may use different terminology for these stages, or conceptualize the stages differently. We will award this point if there is a clear and complete description of these stages.
Model Cards for Model Reporting
Scaling Instruction-Finetuned Language Models
https://arxiv.org/abs/1810.03993
https://arxiv.org/abs/2210.11416
Upstream
Methods
Model objectives
For all stages that are described, is there a clear description of the associated learning objectives or a clear characterization of the nature of this update to the model?
We recognize that different developers may use different terminology for these stages, or conceptualize the stages differently. We will award this point if there is a clear description of the update to the model related to each stage, whether that is the intent of the stage (e.g. making the model less harmful), a mechanistic characterization (e.g. minimizing a specific loss function), or an empirical assessment (e.g. evaluation results conducted before and after the stage).
Model Cards for Model Reporting
Scaling Instruction-Finetuned Language Models
https://arxiv.org/abs/1810.03993
https://arxiv.org/abs/2210.11416
Upstream
Methods
Core frameworks
Are the core frameworks used for model development disclosed?
Examples of core frameworks include Tensorflow, PyTorch, Jax, Hugging Face Transformers, Seqio, T5X, Keras, SciKit, and Triton. If there are significant internal frameworks, there should be some description of their function and/or a reasonably similar publicly-available analogue. We recognize that there does not exist an authoritative or consensus list of core frameworks. For this reason, we will award this point if there is a meaningful, though potentially incomplete, list of major frameworks for the first version of the index.
Model Cards for Model Reporting
Scaling Instruction-Finetuned Language Models
https://arxiv.org/abs/1810.03993
https://arxiv.org/abs/2210.11416
Upstream
Methods
Additional dependencies
Are any dependencies required to build the model disclosed besides data, compute, and code?
For example, if the model depends on an external search engine, programmable APIs, or tools, this should be disclosed. We recognize that there is not widespread consensus regarding what constitutes key dependencies beyond the data, compute, and code. We will award this point only if developers give a reasonable best-effort description of any additional dependencies or make clear that no additional dependencies are required.
Analyzing Leakage of Personally Identifiable Information in Language Models
ProPILE: Probing Privacy Leakage in Large Language Models
https://arxiv.org/abs/2302.00539
https://arxiv.org/abs/2307.01881
Upstream
Data Mitigations
Mitigations for privacy
Are any steps the developer takes to mitigate the presence of PII in the data disclosed?
Such steps might include identifying personal information in the training data, filtering specific datasets to remove personal information, and reducing the likelihood that models will output personal information. We will award this point if the developer reports that it does not take steps to mitigate the presence of PII in the data.
Deduplicating Training Data Mitigates Privacy Risks in Language Models
Machine Learning and Artificial Intelligence: Legal Concepts
https://proceedings.mlr.press/v162/kandpal22a.html
https://genlaw.github.io/glossary.html#legal-concepts
Upstream
Data Mitigations
Mitigations for copyright
Are any steps the developer takes to mitigate the presence of copyrighted information in the data disclosed?
Such steps might include identifying copyrighted data, filtering specific datasets to remove copyrighted data, and reducing the likelihood that models will output copyrighted information. We will award this point if the developer reports that it does take steps to mitigate the presence of copyrighted information in the data.
Addressing "Documentation Debt" in Machine Learning Research: A Retrospective Datasheet for BookCorpus
Machine Learning and Artificial Intelligence: Legal Concepts
https://arxiv.org/abs/2105.05241
https://genlaw.github.io/glossary.html#legal-concepts
Model
Model basics
Input modality
Are the input modalities for the model disclosed?
Input modalities refer to the types or formats of information that the model can accept as input. Examples of input modalities include text, image, audio, video, tables, graphs.
Model Cards for Model Reporting
Interactive Model Cards: A Human-Centered Approach to Model Documentation
https://arxiv.org/abs/1810.03993
https://arxiv.org/abs/2205.02894
Model
Model basics
Output modality
Are the output modalities for the model disclosed?
Output modalities refer to the types or formats of information that the model can accept as output. Examples of output modalities include text, image, audio, video, tables, graphs.
Model Cards for Model Reporting
Interactive Model Cards: A Human-Centered Approach to Model Documentation
https://arxiv.org/abs/1810.03993
https://arxiv.org/abs/2205.02894
Model
Model basics
Model components
Are all components of the model disclosed?
Model components refer to distinct and identifiable parts of the model. We recognize that different developers may use different terminology for model components, or conceptualize components differently. Examples include: (i) For a text-to-image model, components could refer to a text encoder and an image encoder, which may have been trained separately. (ii) For a retrieval-augmented model, components could refer to a separate retriever module.
Model Cards for Model Reporting
Interactive Model Cards: A Human-Centered Approach to Model Documentation
https://arxiv.org/abs/1810.03993
https://arxiv.org/abs/2205.02894
Model
Model basics
Model size
For all components of the model, is the associated model size disclosed?
This information should be reported in appropriate units, which generally is the number of model parameters, broken down by named component. Model size should be reported to a precision of one significant figure (e.g. 500 billion parameters for text encoder, 20 billion parameters for image encoder).
Model Cards for Model Reporting
Interactive Model Cards: A Human-Centered Approach to Model Documentation
https://arxiv.org/abs/1810.03993
https://arxiv.org/abs/2205.02894
Model
Model basics
Model architecture
Is the model architecture disclosed?
Model architecture is the overall structure and organization of a foundation model, which includes the way in which any disclosed components are integrated and how data moves through the model during training or inference. We recognize that different developers may use different terminology for model architecture, or conceptualize the architecture differently. We will award this point for any clear, though potentially incomplete, description of the model architecture.
Model Cards for Model Reporting
Interactive Model Cards: A Human-Centered Approach to Model Documentation
https://arxiv.org/abs/1810.03993
https://arxiv.org/abs/2205.02894
Model
Model basics
Centralized model documentation
Is key information about the model included in a centralized artifact such as a model card?
We recognize that different developers may share this information through different types of documentation, such as a system card or several clearly interrelated documents. We will award this point for the disclosure of any such centralized artifact that provides key information typically included in a model card, though the artifact may be longer-form than a standard model card (e.g. a technical report).
Model Cards for Model Reporting
Interactive Model Cards: A Human-Centered Approach to Model Documentation
https://arxiv.org/abs/1810.03993
https://arxiv.org/abs/2205.02894
Model
Model access
External model access protocol
Is a protocol for granting external entities access to the model disclosed?
A model access protocol refers to the steps, requirements, and considerations involved in granting authorized model access to external entities. We will award this point if the developer discloses key details of its protocol, including (i) where external entities can request access (e.g. via an access request form); (ii) explicit criteria for selecting external entities; and (iii) a transparent decision on whether access has been granted within a specified, reasonable period of time.
The Gradient of Generative AI Release: Methods and Considerations
Structured access: an emerging paradigm for safe AI deployment
https://arxiv.org/abs/2302.04844
https://arxiv.org/abs/2201.05159
Model
Model access
Blackbox external model access
Is black box model access provided to external entities?
Black box model access refers to the ability to query the model with inputs and receive outputs, potentially without further access. Examples of external entities that might be granted access include researchers, third-party auditors, and regulators. We will award this point for any reasonable access level: direct access to the model weights, an interface to query the model, a developer-mediated access program where developers can inspect requests, etc. Developers may receive this point even if there are rate-limits on the number of queries permitted to an external entity and restrictions on the external entities that are permitted access, insofar as these limits and restrictions are transparent.
The Gradient of Generative AI Release: Methods and Considerations
Structured access: an emerging paradigm for safe AI deployment
https://arxiv.org/abs/2302.04844
https://arxiv.org/abs/2201.05159
Model
Model access
Full external model access
Is full model access provided to external entities?
Full model access refers to the ability to access the model via the release of model weights. Developers may receive this point even if there are some restrictions on the external entities that are permitted access (e.g. geographic restrictions), insofar as these restrictions are transparent (e.g. via some high-level description of who has been granted access to the foundation model).
The Gradient of Generative AI Release: Methods and Considerations
Structured access: an emerging paradigm for safe AI deployment
https://arxiv.org/abs/2302.04844
https://arxiv.org/abs/2201.05159
Model
Capabilities
Capabilities description
Are the model's capabilities described?
Capabilities refer to the specific and distinctive functions that the model can perform. We recognize that different developers may use different terminology for capabilities, or conceptualize capabilities differently. We will award this point for any clear, but potentially incomplete, description of the multiple capabilities.
Beyond the Imitation Game: Quantifying and extrapolating the capabilities of language models
Holistic Evaluation of Language Models
https://arxiv.org/abs/2206.04615
https://openreview.net/forum?id=iO4LZibEqW
Model
Capabilities
Capabilities demonstration
Are the model’s capabilities demonstrated?
Demonstrations refer to illustrative examples or other forms of showing the model's capabilities that are legible or understandable for the general public, without requiring specific technical expertise. We recognize that different developers may use different terminology for capabilities, or conceptualize capabilities differently. We will award this point for clear demonstrations of multiple capabilities.
Beyond the Imitation Game: Quantifying and extrapolating the capabilities of language models
Holistic Evaluation of Language Models
https://arxiv.org/abs/2206.04615
https://openreview.net/forum?id=iO4LZibEqW
Model
Capabilities
Evaluation of capabilities
Are the model’s capabilities rigorously evaluated, with the results of these evaluations reported prior to or concurrent with the initial release of the model?
Rigorous evaluations refer to precise quantifications of the model's behavior in relation to its capabilities. We recognize that capabilities may not perfectly align with evaluations, and that different developers may associate capabilities with evaluations differently. We will award this point for clear evaluations of multiple capabilities. For example, this may include evaluations of world knowledge, reasoning, state tracking or other such proficiencies. Or it may include the measurement of average performance (e.g. accuracy, F1) on benchmarks for specific tasks (e.g. text summarization, image captioning). We note that evaluations on standard broad-coverage benchmarks are likely to suffice for this indicator, though they may not if the model's capabilities are presented as especially unusual such that standard evaluations will not suffice.
Beyond the Imitation Game: Quantifying and extrapolating the capabilities of language models
Holistic Evaluation of Language Models
https://arxiv.org/abs/2206.04615
https://openreview.net/forum?id=iO4LZibEqW
Model
Capabilities
External reproducibility of capabilities evaluation
Are the evaluations of the model’s capabilities reproducible by external entities?
For an evaluation to be reproducible by an external entity, we mean that the associated data is either (i) publicly available or (ii) described sufficiently such that a reasonable facsimile can be constructed by an external entity. In addition, the evaluation protocol should be sufficiently described such that if the evaluation is reproduced, any discrepancies with the developer's results can be resolved. We recognize that there does not exist an authoritative or consensus standard for what is required for an evaluation to be deemed externally reproducible. Evaluations on standard benchmarks are assumed to be sufficiently reproducible for the purposes of this index. We will award this point for reproducibility of multiple disclosed evaluations. In the event that an evaluation is not reproducible, a justification by the model developer for why it is not possible for the evaluation to be made reproducible may be sufficient to score this point.
Leakage and the reproducibility crisis in machine-learning-based science
Holistic Evaluation of Language Models
https://www.cell.com/patterns/fulltext/S2666-3899(23)00159-9?_returnURL=https%3A%2F%2Flinkinghub.elsevier.com%2Fretrieve%2Fpii%2FS2666389923001599%3Fshowall%3Dtrue
https://openreview.net/forum?id=iO4LZibEqW
Model
Capabilities
Third party capabilities evaluation
Are the model’s capabilities evaluated by third parties?
By third party, we mean entities that are significantly or fully independent of the developer. We will award this point if (i) a third party has conducted an evaluation of model capabilities, (ii) the results of this evaluation are publicly available, and (iii) these results are disclosed or referred to in the developer’s materials.
Outsider Oversight: Designing a Third Party Audit Ecosystem for AI Governance
Holistic Evaluation of Language Models
https://dl.acm.org/doi/10.1145/3514094.3534181
https://openreview.net/forum?id=iO4LZibEqW
Model
Limitations
Limitations description
Are the model's limitations disclosed?
Limitations refer to the specific and distinctive functions that the model cannot perform (e.g. the model cannot answer questions about current events as it only contains data up to a certain time cutoff, the model is not very capable when it comes to a specific application). We recognize that different developers may use different terminology for limitations, or conceptualize limitations differently. We will award this point for any clear, but potentially incomplete, description of multiple limitations.
The Fallacy of AI Functionality
Holistic Evaluation of Language Models
https://dl.acm.org/doi/abs/10.1145/3531146.3533158
https://openreview.net/forum?id=iO4LZibEqW
Model
Limitations
Limitations demonstration
Are the model’s limitations demonstrated?
Demonstrations refer to illustrative examples or other forms of showing the limitations that are legible or understandable for the general public, without requiring specific technical expertise. We recognize that different developers may use different terminology for limitations, or conceptualize the limitations differently. We will award this point for clear demonstrations of multiple limitations.
The Fallacy of AI Functionality
Holistic Evaluation of Language Models
https://dl.acm.org/doi/abs/10.1145/3531146.3533158
https://openreview.net/forum?id=iO4LZibEqW
Model
Limitations
Third party evaluation of limitations
Can the model’s limitations be evaluated by third parties?
By third parties, we mean entities that are significantly or fully independent of the model developers. In contrast to the third party evaluation indicators for capabilities and risks, we will award this point if third party evaluations are possible even if no third party has yet conducted them. Such evaluations are possible if, for example, the model is deployed via an API (or with open weights) and there are no restrictions on evaluating limitations (e.g. in the usage policy).
Outsider Oversight: Designing a Third Party Audit Ecosystem for AI Governance
Holistic Evaluation of Language Models
https://dl.acm.org/doi/10.1145/3514094.3534181
https://openreview.net/forum?id=iO4LZibEqW
Model
Risks
Risks description
Are the model's risks disclosed?
Risks refer to possible negative consequences or undesirable outcomes that can arise from the model's deployment and usage. This indicator requires disclosure of risks that may arise in the event of both (i) intentional (though possibly careless) use, such as bias or hallucinations and (ii) malicious use, such as fraud or disinformation. We recognize that different developers may use different terminology for risks, or conceptualize risks differently. We will award this point for any clear, but potentially incomplete, description of multiple risks.
Evaluating the Social Impact of Generative AI Systems in Systems and Society
Ethical and social risks of harm from Language Models
https://arxiv.org/abs/2306.05949
https://arxiv.org/abs/2112.04359
Model
Risks
Risks demonstration
Are the model’s risks demonstrated?
Demonstrations refer to illustrative examples or other forms of showing the risks that are legible or understandable for the general public, without requiring specific technical expertise. This indicator requires demonstration of risks that may arise in the event of both (i) intentional (though possibly careless) use, such as biases or hallucinations and (ii) malicious use, such as fraud or disinformation. We recognize that different developers may use different terminology for risks, or conceptualize risks differently. We will award this point for clear demonstrations of multiple risks.
Evaluating the Social Impact of Generative AI Systems in Systems and Society
Ethical and social risks of harm from Language Models
https://arxiv.org/abs/2306.05949
https://arxiv.org/abs/2112.04359
Model
Risks
Unintentional harm evaluation
Are the model’s risks related to unintentional harm rigorously evaluated, with the results of these evaluations reported prior to or concurrent with the initial release of the model?
Rigorous evaluations refer to precise quantifications of the model's behavior in relation to such risks. Unintentional harms include bias, toxicity, and issues relating to fairness. We recognize that unintended harms may not perfectly align with risk evaluations, and that different developers may associate risks with evaluations differently. We will award this point for clear evaluations of multiple such risks. We note that evaluations on standard broad-coverage benchmarks are likely to suffice for this indicator, though they may not if the model's risks related to unintentional harm are presented as especially unusual or severe.
Evaluating the Social Impact of Generative AI Systems in Systems and Society
Ethical and social risks of harm from Language Models
https://arxiv.org/abs/2306.05949
https://arxiv.org/abs/2112.04359
Model
Risks
External reproducibility of unintentional harm evaluation
Are the evaluations of the model’s risks related to unintentional harm reproducible by external entities?
For an evaluation to be reproducible by an external entity, we mean that the associated data is either (i) publicly available or (ii) described sufficiently such that a reasonable facsimile can be constructed by the external entity. In addition, the evaluation protocol should be sufficiently described such that if the evaluation is reproduced, any discrepancies with the developer's results can be resolved. We recognize that there does not exist an authoritative or consensus standard for what is required for an evaluation to be deemed externally reproducible. Evaluations on standard benchmarks are assumed to be sufficiently reproducible for the purposes of this index. We will award this point for reproducibility of multiple disclosed evaluations. In the event that an evaluation is not reproducible, a justification by the developer for why it is not possible for the evaluation to be made reproducible may suffice.
Leakage and the reproducibility crisis in machine-learning-based science
Ethical and social risks of harm from Language Models
https://www.cell.com/patterns/fulltext/S2666-3899(23)00159-9?_returnURL=https%3A%2F%2Flinkinghub.elsevier.com%2Fretrieve%2Fpii%2FS2666389923001599%3Fshowall%3Dtrue
https://arxiv.org/abs/2112.04359
Model
Risks
Intentional harm evaluation
Are the model’s risks related to intentional harm rigorously evaluated, with the results of these evaluations reported prior to or concurrent with the initial release of the model?.
Rigorous evaluations refer to precise quantifications of the model's behavior in relation to such risks. Intentional harms include fraud, disinformation, scams, cybersecurity attacks, designing weapons or pathogens, and uses of the model for illegal purposes. We recognize that unintentional harms may not perfectly align with risk evaluations, and that different developers may associate risks with evaluations differently. We will award this point for clear evaluations of multiple such risks. We note that evaluations on standard broad-coverage benchmarks are likely to suffice for this indicator, though they may not if the model's risks related to unintentional harm are presented as especially unusual or severe.
Evaluating the Social Impact of Generative AI Systems in Systems and Society
Ethical and social risks of harm from Language Models
https://arxiv.org/abs/2306.05949
https://arxiv.org/abs/2112.04359
Model
Risks
External reproducibility of intentional harm evaluation
Are the evaluations of the model’s risks related to intentional harm reproducible by external entities?
For an evaluation to be reproducible by an external entity, we mean that the associated data is either (i) publicly available or (ii) described sufficiently such that a reasonable facsimile can be constructed by the external entity. In addition, the evaluation protocol should be sufficiently described such that if the evaluation is reproduced, any discrepancies with the developer's results can be resolved. We recognize that there does not exist an authoritative or consensus standard for what is required for an evaluation to be deemed externally reproducible. Evaluations on standard benchmarks are assumed to be sufficiently reproducible for the purposes of this index. We will award this point for reproducibility of multiple disclosed evaluations. In the event that an evaluation is not reproducible, a justification by the model developer for why it is not possible for the evaluation to be made reproducible may suffice.
Leakage and the reproducibility crisis in machine-learning-based science
Ethical and social risks of harm from Language Models
https://www.cell.com/patterns/fulltext/S2666-3899(23)00159-9?_returnURL=https%3A%2F%2Flinkinghub.elsevier.com%2Fretrieve%2Fpii%2FS2666389923001599%3Fshowall%3Dtrue
https://arxiv.org/abs/2112.04359
Model
Risks
Third party risks evaluation
Are the model’s risks evaluated by third parties?
By third party, we mean entities that are significantly or fully independent of the developer. A third party risk evaluation might involve the developer allowing a third party to choose a methodology for evaluating risks that differs from that of the developer. We will award this point if (i) a third party has conducted an evaluation of model risks, (ii) the results of this evaluation are publicly available, and (iii) these results are disclosed or referred to in the developer’s materials. If the results are not made public (but are disclosed to have been conducted) and/or the results are not discoverable in the developer’s materials, we will not award this point. We may accept a justification from either the third party or the developer for why part of the evaluation is not disclosed in relation to risks.
Outsider Oversight: Designing a Third Party Audit Ecosystem for AI Governance
Ethical and social risks of harm from Language Models
https://dl.acm.org/doi/10.1145/3514094.3534181
https://arxiv.org/abs/2112.04359
Model
Model Mitigations
Mitigations description
Are the model mitigations disclosed?
By model mitigations, we refer to interventions implemented by the developer at the level of the model to reduce the likelihood and/or the severity of the model’s risks. We recognize that different developers may use different terminology for mitigations, or conceptualize mitigations differently. We will award this point for any clear, but potentially incomplete, description of multiple mitigations associated with the model's risks. Alternatively, we will award this point if the developer reports that it does not mitigate risk.
Evaluating the Social Impact of Generative AI Systems in Systems and Society
Ethical and social risks of harm from Language Models
https://arxiv.org/abs/2306.05949
https://arxiv.org/abs/2112.04359
Model
Model Mitigations
Mitigations demonstration
Are the model mitigations demonstrated?
Demonstrations refer to illustrative examples or other forms of showing the mitigations that are legible or understandable for the general public, without requiring specific technical expertise. We recognize that different developers may use different terminology for mitigations, or conceptualize mitigations differently. We will award this point for clear demonstrations of multiple mitigations. We will also award this point if the developer reports that it does not mitigate the risks associated with the model.
Evaluating the Social Impact of Generative AI Systems in Systems and Society
Ethical and social risks of harm from Language Models
https://arxiv.org/abs/2306.05949
https://arxiv.org/abs/2112.04359
Model
Model Mitigations
Mitigations evaluation
Are the model mitigations rigorously evaluated, with the results of these evaluations reported?
Rigorous evaluations refer to precise quantifications of the model's behavior in relation to the mitigations associated with its risks. We will award this point for clear evaluations of multiple mitigations.
Catastrophic Jailbreak of Open-source LLMs via Exploiting Generation
Ethical and social risks of harm from Language Models
https://arxiv.org/abs/2310.06987
https://arxiv.org/abs/2112.04359
Model
Model Mitigations
External reproducibility of mitigations evaluation
Are the model mitigation evaluations reproducible by external entities?
For an evaluation to be reproducible by an external entity, we mean that the associated data is either (i) publicly available or (ii) described sufficiently such that a reasonable facsimile can be constructed by the external entity. In addition, the evaluation protocol should be sufficiently described such that if the evaluation is reproduced, any discrepancies with the developer's results can be resolved. In the case of mitigations evaluations, this will usually involve details about a comparison to some baseline, which may be a different, unmitigated version of the model. We recognize that there does not exist an authoritative or consensus standard for what is required for an evaluation to be deemed externally reproducible. We will award this point for reproducibility of multiple disclosed evaluations. In the event that an evaluation is not reproducible, a justification by the model developer for why it is not possible for the evaluation to be made reproducible may suffice.
Leakage and the reproducibility crisis in machine-learning-based science
Ethical and social risks of harm from Language Models
https://www.cell.com/patterns/fulltext/S2666-3899(23)00159-9?_returnURL=https%3A%2F%2Flinkinghub.elsevier.com%2Fretrieve%2Fpii%2FS2666389923001599%3Fshowall%3Dtrue
https://arxiv.org/abs/2112.04359
Model
Model Mitigations
Third party mitigations evaluation
Can the model mitigations be evaluated by third parties?
By third party, we mean entities that are significantly or fully independent of the model developers. This indicator assesses whether it is possible for third parties to assess mitigations, which is not restricted to the methods the developer uses to assess mitigations. In contrast to the third party evaluation indicators for capabilities and risks, we will award this point if third party evaluations are possible even if no third party has yet conducted them.
Outsider Oversight: Designing a Third Party Audit Ecosystem for AI Governance
Ethical and social risks of harm from Language Models
https://dl.acm.org/doi/10.1145/3514094.3534181
https://arxiv.org/abs/2112.04359
Model
Trustworthiness
Trustworthiness evaluation
Is the trustworthiness of the model rigorously evaluated, with the results of these evaluations disclosed?
Rigorous evaluations refer to precise quantifications of the model's behavior in relation to its trustworthiness. For example, this may include evaluations of the model’s robustness or reliability, its uncertainty, calibration, or causality, or its interpretability or explainability. We recognize that trustworthiness may not perfectly align with evaluations, and that different developers may associate trustworthiness with evaluations differently. We will award this point for a clear evaluation of the trustworthiness of the model.
Toward Trustworthy AI Development: Mechanisms for Supporting Verifiable Claims
DecodingTrust: A Comprehensive Assessment of Trustworthiness in GPT Models
https://arxiv.org/abs/2004.07213
https://arxiv.org/abs/2306.11698
Model
Trustworthiness
External reproducibility of trustworthiness evaluation
Are the trustworthiness evaluations reproducible by external entities?
For an evaluation to be reproducible by an external entity, we mean that the associated data is either (i) publicly available or (ii) described sufficiently such that a reasonable facsimile can be constructed by the external entity. In addition, the evaluation protocol should be sufficiently described such that if the evaluation is reproduced, any discrepancies with the developer's results can be resolved. We recognize that there does not exist an authoritative or consensus standard for what is required for an evaluation to be deemed externally reproducible. Evaluations on standard benchmarks are assumed to be sufficiently reproducible for the purposes of this index. We will award this point for reproducibility of at least one evaluation. In the event that an evaluation is not reproducible, we may accept a justification by the model developer for why it is not possible for the evaluation to be made reproducible.
Leakage and the reproducibility crisis in machine-learning-based science
Bridging the Gap Between Ethics and Practice: Guidelines for Reliable, Safe, and Trustworthy Human-centered AI Systems
https://www.cell.com/patterns/fulltext/S2666-3899(23)00159-9?_returnURL=https%3A%2F%2Flinkinghub.elsevier.com%2Fretrieve%2Fpii%2FS2666389923001599%3Fshowall%3Dtrue
https://dl.acm.org/doi/10.1145/3419764
Model
Inference
Inference duration evaluation
Is the time required for model inference disclosed for a clearly-specified task on a clearly-specified set of hardware?
The duration should be reported in seconds to a precision of one significant figure (e.g. 0.002 seconds). We recognize that no established standard exists for the standardized reporting of inference evaluation. Therefore, we permit the developer to specify the task and hardware setup, as long as both are disclosed. The hardware in this evaluation need not be the hardware the developer uses for inference if it in fact does any inference itself. For example, the specific task might be generating 100,000 tokens as 5,000 sequences of length 20 and the fixed set of hardware might be 8 NVIDIA A100s. The hardware in this evaluation need not be the hardware the developer uses for inference if it in fact does any inference itself.
MLPerf Inference Benchmark
Cheaply Evaluating Inference Efficiency Metrics for Autoregressive Transformer APIs
https://arxiv.org/abs/1911.02549
https://arxiv.org/abs/2305.02440
Model
Inference
Inference compute evaluation
Is the compute usage for model inference disclosed for a clearly-specified task on a clearly-specified set of hardware?
Compute usage for inference should be reported in FLOPS to a precision of one significant figure (e.g. 5 x $10^{25}$ FLOPS). We recognize that no established standard exists for the standardized reporting of inference evaluation. Therefore, we permit the developer to specify the task and hardware setup, as long as both are clear. For example, the specific task might be generating 100k tokens as 5k sequences of length 20 and the fixed set of hardware might be 8 NVIDIA A100s. The hardware in this evaluation need not be the hardware the developer uses for inference if it in fact does any inference itself.
MLPerf Inference Benchmark
Cheaply Evaluating Inference Efficiency Metrics for Autoregressive Transformer APIs
https://arxiv.org/abs/1911.02549
https://arxiv.org/abs/2305.02440
Downstream
Distribution
Release decision-making
Is the developer’s protocol for deciding whether or not to release a model disclosed?
We recognize that the release of a foundation model falls along a spectrum, with many forms of partial release, and that different developers may conceptualize release differently. We will award this point for any clear protocol that discusses the decision-making process, including if the protocol is more general to the developer rather than the specific foundation model under consideration.
The Gradient of Generative AI Release: Methods and Considerations
The Time Is Now to Develop Community Norms for the Release of Foundation Models
https://arxiv.org/abs/2302.04844
https://hai.stanford.edu/news/time-now-develop-community-norms-release-foundation-models
Downstream
Distribution
Release process
Is a description of the process of how the model was released disclosed?
A description of the release process might include information about who received access to the model at what stage of the release of the model. For example, a developer might conduct a staged release where it releases the model to a select group at first and subsequently makes the model more widely available. We recognize that the release of a foundation model falls along a spectrum, with many different forms of release, and that different developers may conceptualize release differently. We will award this point for any detailed discussion of the release process, including if the discussion is more general to the developer rather than the specific foundation model under consideration.
The Gradient of Generative AI Release: Methods and Considerations
The Time Is Now to Develop Community Norms for the Release of Foundation Models
https://arxiv.org/abs/2302.04844
https://hai.stanford.edu/news/time-now-develop-community-norms-release-foundation-models
Downstream
Distribution
Distribution channels
Are all distribution channels disclosed?
By distribution channel, we mean any pathway by which the model is made accessible to entities beyond the developer. We recognize that distribution channels may arise without the knowledge of the model developer. For example, the weights of a model may be released through one distribution channel and then be distributed through other channels. We will award this point if the developer discloses all of the distribution channels of which it is aware.
Understanding accountability in algorithmic supply chains
Thinking Upstream: Ethics and Policy Opportunities in AI Supply Chains
https://dl.acm.org/doi/10.1145/3593013.3594073
https://arxiv.org/abs/2303.07529
Downstream
Distribution
Products and services
Does the developer disclose whether any products and services offered by the developer are dependent on the model?
We recognize that a developer may provide many products and services that depend on a foundation model or internal derivatives of the model. We will award this point for a reasonable best-effort description of any ways the developer makes internal use of the model in its products or services.
Understanding accountability in algorithmic supply chains
On AI Deployment: AI supply chains (and why they matter)
https://dl.acm.org/doi/10.1145/3593013.3594073
https://aipolicy.substack.com/p/supply-chains-2
Downstream
Distribution
Detection of machine-generated content
Are any mechanisms for detecting content generated by this model disclosed?
Such a mechanism might include storing a copy of all outputs generated by the model to compare against, implementing a watermark when generating content using the model, or training a detector post-hoc to identify such content. We will award this point if any such mechanism is disclosed or if the developer reports that it has no such mechanism.
A Watermark for Large Language Models
Robust Distortion-free Watermarks for Language Models
https://arxiv.org/abs/2301.10226
https://www.semanticscholar.org/paper/Robust-Distortion-free-Watermarks-for-Language-Kuditipudi-Thickstun/ccaff61e0c1e629d91d78f82a64b3cbc8f3f7023
Downstream
Distribution
Model License
Is a license for the model disclosed?
In the event that licenses are written more generally, it should be clear which assets they apply to. We recognize that different developers may adopt different business models and therefor have different types of model licenses. Examples of model licenses include responsible AI licenses, open-source licenses, and licenses that allow for commercial use.
Stronger Together: on the Articulation of Ethical Charters, Legal Tools, and Technical Documentation in ML
An investigation of licensing of datasets for machine learning based on the GQM model
https://arxiv.org/abs/2305.18615
https://arxiv.org/abs/2303.13735
Downstream
Distribution
Terms of service
Are terms of service disclosed for each distribution channel?
We will award this point if there are terms-of-service that appear to apply to the bulk of the model’s distribution channels.
Terms-we-Serve-with: a feminist-inspired social imaginary for improved transparency and engagement in AI
Identifying Terms and Conditions Important to Consumers using Crowdsourcing
https://arxiv.org/abs/2206.02492
https://arxiv.org/abs/2111.12182
Downstream
Usage policy
Permitted and prohibited users
Is a description of who can and cannot use the model disclosed?
Such restrictions may relate to countries (e.g. US-only), organizations (e.g. no competitors), industries (e.g. no weapons industry users) or other relevant factors. These restrictions on users are often contained in multiple policies; we group them here for simplicity. We will awarded this point for a clear description of permitted, restricted, and prohibited users of the model.
Best Practices for Deploying Language Models
Meta Platform Terms
https://txt.cohere.com/best-practices-for-deploying-language-models/
https://developers.facebook.com/terms/#datause
Downstream
Usage policy
Permitted, restricted, and prohibited uses
Are permitted, restricted, and prohibited uses of the model disclosed?
We will award this point if at least two of the following three categories are disclosed: (i) permitted uses, (ii) restricted uses, and (iii) prohibited uses. By restricted uses, we mean uses that require a higher level of scrutiny (such as permission from or a separate contract with the developer) to be permitted. These uses are generally included in an acceptable use policy, model license, or usage policy.
Best Practices for Deploying Language Models
Meta Platform Terms
https://txt.cohere.com/best-practices-for-deploying-language-models/
https://developers.facebook.com/terms/#datause
Downstream
Usage policy
Usage policy enforcement
Is the enforcement protocol for the usage policy disclosed?
By enforcement protocol, we refer to (i) mechanisms for identifying permitted and prohibited users, (ii) mechanisms for identifying permitted/restricted/prohibited uses, (iii) steps the developer takes to enforce its policies related to such uses, and (iv) the developer’s procedures for carrying out these steps. We will award this point for a reasonable best-effort attempt to provide the bulk of this information, though one line indicating the developer reserves the right to terminate accounts is insufficient. Alternatively, we will award this point if the developer reports that it does not enforce its usage policy.
Best Practices for Deploying Language Models
Meta Platform Terms
https://txt.cohere.com/best-practices-for-deploying-language-models/
https://developers.facebook.com/terms/#datause
Downstream
Usage policy
Justification for enforcement action
Do users receive a justification when they are subject to an enforcement action for violating the usage policy?
For example, does the developer disclose a protocol for telling users which part of the usage policy they violated, when they did so, and what specifically was violative? Enforcement actions refer to measures to limit a user’s ability to use the model, such as banning a user or restricting their ability to purchase tokens. We will award this point if the developer discloses that it gives justification for enforcement actions or, alternatively, if it discloses that it does not provide justification for enforcement actions or that it does not enforce its usage policy.
Best Practices for Deploying Language Models
Meta Platform Terms
https://txt.cohere.com/best-practices-for-deploying-language-models/
https://developers.facebook.com/terms/#datause
Downstream
Usage policy
Usage policy violation appeals mechanism
Is a mechanism for appealing potential usage policy violations disclosed?
We will award this point if the developer provides a usage policy violation appeals mechanism, regardless of whether it is provided via a user interface or distribution channel.
Best Practices for Deploying Language Models
Meta Platform Terms
https://txt.cohere.com/best-practices-for-deploying-language-models/
https://developers.facebook.com/terms/#datause
Downstream
Model behavior policy
Permitted, restricted, and prohibited model behaviors
Are model behaviors that are permitted, restricted, and prohibited disclosed?
We refer to a policy that includes this information as a model behavior policy, or a developer's policy on what the foundation model can and cannot do (e.g. such a policy may prohibit a model from generating child sexual abuse material). We recognize that different developers may adopt different business models and that some business models may make enforcement of a model behavior policy more or less feasible. We will award this point if at least two of the three categories (i.e. permitted, restricted, and prohibited model behaviors) are disclosed. Alternatively, we will award this point if the developer reports that it does not impose any restrictions on its model's behavior.
I'm Afraid I Can't Do That: Predicting Prompt Refusal in Black-Box Generative Language Models
Fine-tuning Aligned Language Models Compromises Safety, Even When Users Do Not Intend To!
https://arxiv.org/abs/2306.03423
https://arxiv.org/abs/2310.03693
Downstream
Model behavior policy
Model behavior policy enforcement
Is the enforcement protocol for the model behavior policy disclosed?
By enforcement protocol, we refer to mechanisms for identifying whether model behavior is permitted or prohibited and actions that may arise in the event the model behavior policy is violated. For example, the developer may make updates to the model in response to issues with the model’s adherence to the model behavior policy. We will award this point if there is a clear description of the enforcement protocol, or if the developer reports that it does not enforce its model behavior policy or that it has no such restrictions on the model’s behavior.
Toward Trustworthy AI Development: Mechanisms for Supporting Verifiable Claims
Fine-tuning Aligned Language Models Compromises Safety, Even When Users Do Not Intend To!
https://arxiv.org/abs/2004.07213
https://arxiv.org/abs/2310.03693
Downstream
Model behavior policy
Interoperability of usage and model behavior policies
Is the way that the usage policy and the model behavior policy interoperate disclosed?
For example, if a user attempts to use the model for a prohibited use such as spam, how does the model behavior policy apply if at all? We will also award this point if the developer reports that it does not impose any restrictions on its model's behavior in the event of usage policy violation.
I'm Afraid I Can't Do That: Predicting Prompt Refusal in Black-Box Generative Language Models
Fine-tuning Aligned Language Models Compromises Safety, Even When Users Do Not Intend To!
https://arxiv.org/abs/2306.03423
https://arxiv.org/abs/2310.03693
Downstream
User Interface
User interaction with AI system
For distribution channels with user-facing interfaces, are users notified (i) that they are interacting with an AI system, (ii) of the specific foundation model they are interacting with, and (iii) that outputs are machine-generated?
A user-facing interface refers to the means by which the user interacts with the foundation model, including how the user can observe outputs from the foundation model and other notifications. We will award this point if, for all distribution channels with user-facing interfaces, the user is provided adequate transparency as to the foundation model being distributed and the potential presence of any model outputs.
Designing Responsible AI: Adaptations of UX Practice to Meet Responsible AI Challenges
Towards Responsible AI: A Design Space Exploration of Human-Centered Artificial Intelligence User Interfaces to Investigate Fairness
https://dl.acm.org/doi/10.1145/3544548.3581278
https://arxiv.org/abs/2206.00474
Downstream
User Interface
Usage disclaimers
For distribution channels with user-facing interfaces, are users provided with disclaimers involving model use?
A user-facing interface refers to the means by which the user interacts with the foundation model, including how the user can observe outputs from the foundation model and other notifications. Usage disclaimers could include information about what constitutes a usage policy violations or how users should interpret model outputs. We will award this point if, for all distribution channels with user-facing interfaces, the user is provided with usage disclaimers.
Designing Responsible AI: Adaptations of UX Practice to Meet Responsible AI Challenges
Towards Responsible AI: A Design Space Exploration of Human-Centered Artificial Intelligence User Interfaces to Investigate Fairness
https://dl.acm.org/doi/10.1145/3544548.3581278
https://arxiv.org/abs/2206.00474
Downstream
User data protection
User data protection policy
Are the protocols for how the developer stores, accesses, and shares user data disclosed?
We will also award this point if the developer reports that it has no user data protection policy.
Privacy as Contextual Integrity
Redesigning Data Privacy: Reimagining Notice & Consent for human technology interaction
https://digitalcommons.law.uw.edu/wlr/vol79/iss1/10/
https://www.weforum.org/reports/redesigning-data-privacy-reimagining-notice-consent-for-humantechnology-interaction/
Downstream
User data protection
Permitted and prohibited use of user data
Are permitted and prohibited uses of user data disclosed?
Developers use user data for a range of purposes such as building future models, updating existing models, and evaluating both existing and future models. We will award this point if a developer discloses its policy on the use of user data from interactions associated with this model, including both permitted and prohibited uses. This may span different distribution channels if multiple channels supply user data to the developer. Alternatively, we will award this point if the developer reports it does not impose any limits on its use of user data.
Privacy as Contextual Integrity
Redesigning Data Privacy: Reimagining Notice & Consent for human technology interaction
https://digitalcommons.law.uw.edu/wlr/vol79/iss1/10/
https://www.weforum.org/reports/redesigning-data-privacy-reimagining-notice-consent-for-humantechnology-interaction/
Downstream
User data protection
Usage data access protocol
Is a protocol for granting external entities access to usage data disclosed?
Usage data refers to the data created through user interaction with the model, such as user inputs to the model and associated metadata such as the duration of the interaction. A usage data access protocol refers to the steps, requirements, and considerations involved in granting external entities access to usage data; this goes beyond stating the conditions under which related personal information may be shared with external entities. We will award this point for a clear description of the usage data access protocol or if the developer reports it does not share usage data with external entities.
How Cambridge Analytica Sparked the Great Privacy Awakening
Redesigning Data Privacy: Reimagining Notice & Consent for human technology interaction
https://www.wired.com/story/cambridge-analytica-facebook-privacy-awakening/
https://www.weforum.org/reports/redesigning-data-privacy-reimagining-notice-consent-for-humantechnology-interaction/
Downstream
Model Updates
Versioning protocol
Is there a disclosed version and versioning protocol for the model?
By versioning, we mean that each instance of the model is uniquely identified and that the model is guaranteed to not change when referring to a fixed version number; alternatively, the version clearly indicating a specific instance of the model may be able to change by noting that it is the "latest" or an "unstable" version. We recognize that different developers may adopt different versioning practices that may differ from standard semantic versioning practices used elsewhere in software engineering.
How is ChatGPT's behavior changing over time?
Putting the Semantics into Semantic Versioning
https://arxiv.org/abs/2307.09009
https://arxiv.org/abs/2008.07069
Downstream
Model Updates
Change log
Is there a disclosed change log for the model?
By change log, we mean a description associated with each change to the model (which should be indicated by a change in version number). We recognize that different developers may adopt different practices for change logs that may differ from practices used elsewhere in software engineering. We will award this point if the change log provides a clear description of changes that is legible to a technical audience.
How is ChatGPT's behavior changing over time?
Watch out for This Commit! A Study of Influential Software Changes
https://arxiv.org/abs/2307.09009
https://arxiv.org/abs/1606.03266
Downstream
Model Updates
Deprecation policy
Is there a disclosed deprecation policy for the developer?
By deprecation policy, we refer to a description of what it means for a model to be deprecated and how users should respond to the deprecation (e.g. instructions to migrate to a newer version). We will award this point for a clear disclosure of a deprecation policy or if there is no risk of deprication (e.g. if the developer openly releases model weights).
How is ChatGPT's behavior changing over time?
Automatic Android Deprecated-API Usage Update by Learning from Single Updated Example
https://arxiv.org/abs/2307.09009
https://arxiv.org/abs/2005.13220
Downstream
Feedback
Feedback mechanism
Is a feedback mechanism disclosed?
By feedback mechanism, we refer to a means for external entities to report feedback or issues that arise in relation to the foundation model. Such entities may include but are not necessarily limited to users. We will award this point if the developer discloses a feedback mechanism that has been implemented.
Ecosystem Graphs: The Social Footprint of Foundation Models
Outsider Oversight: Designing a Third Party Audit Ecosystem for AI Governance
https://www.semanticscholar.org/paper/Ecosystem-Graphs%3A-The-Social-Footprint-of-Models-Bommasani-Soylu/8ed7c9ba7cdb33e816135381ca502ace649c7985
https://dl.acm.org/doi/10.1145/3514094.3534181
Downstream
Feedback
Feedback summary
Is a report or summary disclosed regarding the feedback the developer received or, alternatively, the way the developer responded to that feedback?
We recognize that there does not exist an authoritative or consensus standard for what is required in a feedback report. For this reason, we will award this point if there is a meaningful, though potentially vague or incomplete, summary of feedback received.
Achieving Transparency Report Privacy in Linear Time
Evaluating a Methodology for Increasing AI Transparency: A Case Study
https://arxiv.org/abs/2104.00137
https://arxiv.org/abs/2201.13224
Downstream
Feedback
Government inquiries
Is a summary of government inquiries related to the model received by the developer disclosed?
Such government inquiries might include requests for user data, requests that certain content be banned, or requests for information about a developer’s business practices. We recognize that there does not exist an authoritative or consensus standard for what is required for such a summary of government inquiries. For this reason, we will award this point if (i) there is a meaningful, though potentially vague or incomplete, summary of government inquiries, or (ii) a summary of government inquiries related to user data.
Transparency Report: Government requests on the rise
Ecosystem Graphs: The Social Footprint of Foundation Models
https://blog.google/technology/safety-security/transparency-report-government-requests/
https://www.semanticscholar.org/paper/Ecosystem-Graphs%3A-The-Social-Footprint-of-Models-Bommasani-Soylu/8ed7c9ba7cdb33e816135381ca502ace649c7985
Downstream
Impact
Monitoring mechanism
For each distribution channel, is a monitoring mechanism for tracking model use disclosed?
By monitoring mechanism, we refer to a specific protocol for tracking model use that goes beyond an acknowledgement that usage data is collected. We will also award this point for a reasonable best-effort attempt to describe monitoring mechanisms, or if a developer discloses that a distribution channel is not monitored.
Progressive Disclosure: Designing for Effective Transparency
Ecosystem Graphs: The Social Footprint of Foundation Models
https://arxiv.org/abs/1811.02164
https://www.semanticscholar.org/paper/Ecosystem-Graphs%3A-The-Social-Footprint-of-Models-Bommasani-Soylu/8ed7c9ba7cdb33e816135381ca502ace649c7985
Downstream
Impact
Downstream applications
Across all forms of downstream use, is the number of applications dependent on the foundation model disclosed?
We recognize that there does not exist an authoritative or consensus standard for what qualifies as an application. We will award this point if there is a meaningful estimate of the number of downstream applications, along with some description of what it means for an application to be dependent on the model.
Market concentration implications of foundation models: The Invisible Hand of ChatGPT
Ecosystem Graphs: The Social Footprint of Foundation Models
https://www.brookings.edu/articles/market-concentration-implications-of-foundation-models-the-invisible-hand-of-chatgpt/
https://www.semanticscholar.org/paper/Ecosystem-Graphs%3A-The-Social-Footprint-of-Models-Bommasani-Soylu/8ed7c9ba7cdb33e816135381ca502ace649c7985
Downstream
Impact
Affected market sectors
Across all downstream applications, is the fraction of applications corresponding to each market sector disclosed?
By market sector, we refer to an identifiable part of the economy. While established standards exist for describing market sectors, we recognize that developers may provide vague or informal characterizations of market impact. We will award this point if there is a meaningful, though potentially vague or incomplete, summary of affected market sectors.
Market concentration implications of foundation models: The Invisible Hand of ChatGPT
Ecosystem Graphs: The Social Footprint of Foundation Models
https://www.brookings.edu/articles/market-concentration-implications-of-foundation-models-the-invisible-hand-of-chatgpt/
https://www.semanticscholar.org/paper/Ecosystem-Graphs%3A-The-Social-Footprint-of-Models-Bommasani-Soylu/8ed7c9ba7cdb33e816135381ca502ace649c7985
Downstream
Impact
Affected individuals
Across all forms of downstream use, is the number of individuals affected by the foundation model disclosed?
By affected individuals, we principally mean the number of potential users of applications. We recognize that there does not exist an authoritative or consensus standard for what qualifies as an affected individual. We will award this point if there is a meaningful estimate of the number of affected individuals along with a clear description of what it means for an individual to be affected by the model.
Market concentration implications of foundation models: The Invisible Hand of ChatGPT
Ecosystem Graphs: The Social Footprint of Foundation Models
https://www.brookings.edu/articles/market-concentration-implications-of-foundation-models-the-invisible-hand-of-chatgpt/
https://www.semanticscholar.org/paper/Ecosystem-Graphs%3A-The-Social-Footprint-of-Models-Bommasani-Soylu/8ed7c9ba7cdb33e816135381ca502ace649c7985
Downstream
Impact
Usage reports
Is a usage report that gives usage statistics describing the impact of the model on users disclosed?
We recognize that there does not exist an authoritative or consensus standard for what is required in a usage report. Usage statistics might include, for example, a description of the major categories of harm that has been caused by use of the model. We will award this point if there is a meaningful, though potentially vague or incomplete, summary of usage statistics.
Expert explainer: Allocating accountability in AI supply chains
Ecosystem Graphs: The Social Footprint of Foundation Models
https://www.adalovelaceinstitute.org/resource/ai-supply-chains/
https://www.semanticscholar.org/paper/Ecosystem-Graphs%3A-The-Social-Footprint-of-Models-Bommasani-Soylu/8ed7c9ba7cdb33e816135381ca502ace649c7985
Downstream
Impact
Geographic statistics
Across all forms of downstream use, are statistics of model usage across geographies disclosed?
We will award this point if there is a meaningful, though potentially incomplete or vague, disclosure of geographic usage statistics at the country-level.
Expert explainer: Allocating accountability in AI supply chains
Ecosystem Graphs: The Social Footprint of Foundation Models
https://www.adalovelaceinstitute.org/resource/ai-supply-chains/
https://www.semanticscholar.org/paper/Ecosystem-Graphs%3A-The-Social-Footprint-of-Models-Bommasani-Soylu/8ed7c9ba7cdb33e816135381ca502ace649c7985
Downstream
Impact
Redress mechanism
Is any mechanism to provide redress to users for harm disclosed?
We will also award this point if the developer reports it does not have any such redress mechanism.
Computational Power and AI
Ecosystem Graphs: The Social Footprint of Foundation Models
https://ainowinstitute.org/publication/policy/compute-and-ai
https://www.semanticscholar.org/paper/Ecosystem-Graphs%3A-The-Social-Footprint-of-Models-Bommasani-Soylu/8ed7c9ba7cdb33e816135381ca502ace649c7985
Downstream
Documentation for Deployers
Centralized documentation for downstream use
Is documentation for downstream use centralized in a centralized artifact?
Centralized documentation for downstream use refers to an artifact, or closely-linked artifacts, that consolidate relevant information for making use of or repurposing the model. Examples of these kinds of artifacts include a website with dedicated documentation information, a github repository with dedicated documentation information, and an ecosystem card. We recognize that different developers may take different approaches to centralizing information. We will award this point if there is a clearly-identified artifact(s) that contains the majority of substantive information (e.g. capabilities, limitations, risks, evaluations, distribution channels, model license, usage policies, model behavior policies, feedback and redress mechanisms, dependencies).
Datasheets for Datasets
Model Cards for Model Reporting
https://arxiv.org/abs/1803.09010
https://arxiv.org/abs/1810.03993
Downstream
Documentation for Deployers
Documentation for responsible downstream use
Is documentation for responsible downstream use disclosed?
Such documentation might include details on how to adjust API settings to promote responsible use, descriptions of how to implement mitigations, or guidelines for responsible use. We will also award this point if the developer states that it does not provide any such documentation. For example, the developer might state that the model is offered as is and downstream developers are accountable for using the model responsibly.
Ecosystem Graphs: The Social Footprint of Foundation Models
Expert explainer: Allocating accountability in AI supply chains
https://www.semanticscholar.org/paper/Ecosystem-Graphs%3A-The-Social-Footprint-of-Models-Bommasani-Soylu/8ed7c9ba7cdb33e816135381ca502ace649c7985
https://www.adalovelaceinstitute.org/resource/ai-supply-chains/

Dataset Card for Dataset Name

The Foundation Model Transparency Index is an ongoing initiative of the CRFM to comprehensively assess the transparency of foundation model developers.

Dataset Sources

Uses

Assess the transparency of foundation model developers.

Dataset Structure

  • Domain: Upstream (model building), Model (properties and function), and Downstream (distribution and usage).
  • Subdomain: Data, labor, compute, methods, model basics, model access, capabilities, risks, mitigations, distribution, usage policy, feedback, and impact.
  • Indicator: Name of the indicator.
  • Definition: Question for the developers of the model.
  • Notes: Explanation of how to receive the point.
  • References: Reference_1 and Reference_2 with their corresponding Link_1 and Link_2.

Citation

@article{bommasani2023fmti,
  author       = {Bommasani, Rishi and
                  Klyman, Kevin and
                  Longpre, Shayne and
                  Kapoor, Sayash and
                  Maslej, Nestor and
                  Xiong, Betty and
                  Zhang, Daniel and
                  Liang, Percy},
  title        = {The Foundation Model Transparency Index},
  month        = oct,
  year         = 2023,
  url          = {https://crfm.stanford.edu/fmti/FMTI.pdf}
}
Downloads last month
1
Edit dataset card

Space using mariagrandury/fmti-indicators 1

Collection including mariagrandury/fmti-indicators