<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1601576979905566&amp;ev=PageView&amp;noscript=1">
Logo ON WHITE-1
Solutions & Services Success Stories Partners
Resources
All Resources
Technology Topics & Trends
About
Our Story
Our People
Accreditations
Corporate Social Responsibility
Careers
Contact
  • data security icon
    Data Security & Resilience

    Secure data optimisation & proactive backup

  • software icon
    Software

    Proactive Licencing, Compliance & Asset Management

  • cyber security icon
    Cyber Security

    Agile, Modular & Secure Cybersecurity & Managed Siem

  • cyber security icon
    Cloud & Datacentre

    Manage & Transform Multi-cloud, Hybrid & On-premise

cyber security icon Managed Backup disaster recovery icon Disaster Recovery storage management icon Storage Management cyber recovery icon Cyber Recovery CopyAssure icon CopyAssure
cyber security icon Software Licensing cyber security icon Managed License Compliance cyber security icon Software Asset Management
cyber security icon Managed SIEM cyber security icon Exposure Management cyber security icon MXDR cyber security icon MDR cyber security icon Security Consultancy cyber security icon Incident Response cyber security icon Cyber Security Assessment
cyber security icon Infrastructure Modernisation cyber security icon Cloud Optimisation cyber security icon Datacentre Services cyber security icon Hybrid Cloud cyber security icon ProCare
  • Contact
  • Sign In
  • Contact
  • Sign In
×
  • Solutions & Services
  • Success Stories
  • Partners
  • Resources
  • About
Solutions & Services
  • Data Security & Resilience

    • cyber security icon Managed Backup
    • cyber security icon Disaster Recovery
    • cyber security icon Data Storage Management
    • cyber recovery icon Cyber Recovery
    • CopyAssure icon CopyAssure
  • Software

    • cyber security icon Software Licensing
    • cyber security icon Managed License Compliance
    • cyber security icon Software Asset Management
  • Cyber Security

    • cyber security icon Managed SIEM
    • cyber security icon Exposure Management
    • cyber security icon MXDR
    • cyber security icon MDR
    • cyber security icon Security Consultancy
    • cyber security icon Incident Response
    • cyber security icon Cyber Security Assessment
  • Cloud & Datacentre

    • cyber security icon Infrastructure Modernisation
    • cyber security icon Cloud Optimisation
    • cyber security icon Datacentre Services
    • cyber security icon Hybrid Cloud
    • cyber security icon ProCare
Resources
  • All Resources
  • Technology Topics & Trends
About
  • Our Story
  • Our People
  • Careers
  • Contact
  • Accreditations
  • Corporate Social Responsibility

Blog

Data Security & Resilience

Securing AI in Councils: Data, Shadow AI & Governance

Abikaye Mehat
Abikaye Mehat

11 July 2025

Time to read

Loading read time...

Share this post

Table of contents

  • Why AI Security and Governance Must Come First in Councils
  • Step 1 - Discover Shadow AI
  • Step 2 - Build AI Security from Day One
  • Step 3 - Address AI Governance and Compliance
  • Trustworthy AI Starts with Visibility, Security and Strong Governance
Button Text

 

Why AI Security and Governance Must Come First in Councils

81% of leaders say secure and trustworthy AI is essential to business success, yet only 24% of generative AI projects are currently being secured*. The gap between AI innovation and AI security is especially risky for the public sector.

As local councils explore generative AI to improve citizen services, streamline operations, or reduce costs, the focus must shift to AI governance and security. Without robust policies and visibility, shadow AI can compromise sensitive AI data, breach compliance rules, and reduce public trust.

This blog outlines three steps that councils should follow to secure AI within their organisation. Looking to secure your AI tools? Book an AI risk workshop with Celerity and IBM to take the first step toward secure, governed, and trustworthy AI.

Step 1 - Discover Shadow AI

Uncover Unauthorised AI Use to Protect Sensitive AI Data

Shadow AI refers to the use of AI tools within an organisation, without IT approval. For example, employees may use tools like ChatGPT to optimise policy work, enhance communications and create draft content for projects such as grant applications – all without an IT teams knowledge.

AI can help council teams work smarter, but it also comes with risks. Staff might accidentally share sensitive or personal data outside council systems when using AI tools, which could lead to a data breach. Plus, AI doesn’t always get things right—its answers can be off or biased. If decisions are made based on these without double-checking, it could mean unfair service and unhappy residents.

To prevent shadow AI, organisations should run an internal exercise to understand where AI is being used and the associated risks. It's important that all employees understand safe use of AI and company policies around AI.

Step 2 - Build AI Security from Day One

Embed AI Security into Every Generative AI Project 

As AI projects become more common in councils, it's important to make security part of the plan from the start. Every AI models must have the right measures in place to prevent tampering, unauthorised access and IP theft. For example, if a team builds a chatbot fine-tuned on council housing data and doesn't restrict access, the model and data could be exploited or cloned.

Whenever you input data into AI models, whether it is citizen data, HR data or financial records, it must be encrypted and anonymised so it can’t be exploited. Sharing confidential information into AI tools, without the right safeguards, is a breach of GDPR which could result in hefty fines and reputational damage for a council. For example, if a social care department tests AI to summarise case notes, without anonymisation, real names and conditions are exposed in prompts, this is a GDPR breach.

Organisations should identify and document the risks of generative AI as part of their overall cyber security and risk management process. This should be reviewed with every new project.Project stakeholders must make sure security controls and governance are followed. By partnering with trusted technology providers, local authorities can build secure AI workflows and focus on innovation with confidence.

Step 3 - Address AI Governance and Compliance

Establish Trustworthy AI Through Policy and Oversight

With new rules around AI, councils need to get ready for changing expectations from government and regulators. The EU AI Act, for example, is raising the bar on human oversight and compliance, and could influence regulations beyond Europe.

For councils to benefit from AI, it has to be used in a way that’s open, fair and easy to review. Good AI governance means focusing on three things:

  • Explainability: Be able to show how AI made its decision, with clear reasons a human can check and explain.

  • Accountability: Assign an owner to each AI tool, set clear policies for acceptable use, and know what to do if something goes wrong.

  • Bias and fairness: Regularly check AI models for bias and make sure people have a way to challenge decisions that affect them.

Setting up the right rules and ownership will help councils use AI legally, ethically, and with public trust.

Trustworthy AI Starts with Visibility, Security and Strong Governance

AI could revolutionise the way councils operate, but it must be adopted responsibly. Councils have a duty to protect AI data, uphold compliance, and build public trust through secure and transparent AI usage. Starting with identifying Shadow AI across teams, embedding security within AI projects and prioritising AI governance so that every AI tool is explainable, accountable and fair.

Trustworthy AI isn’t just about technology. It’s about policy, accountability, and proactive risk management. By prioritising AI governance and AI security, councils can safely embrace AI and deliver meaningful innovation for the communities they serve.

Book an AI risk workshop with Celerity and IBM to take the first step toward secure, governed, and trustworthy AI.

 

*Source: IBM Institute for Business Value Study 2024

Latest News

All Resources
Zero Trust - Celerity Limited
Zero Trust - Celerity Limited
Cyber Security

Zero Trust - Celerity Limited

Secure your data, eliminate risk and harness the power of Zero Trust.

Read topic
Ransomware - Celerity Limited
Ransomware - Celerity Limited
Cyber Security

Ransomware - Celerity Limited

Protecting your business from threats and data loss.

Read topic
Software Licence Compliance
Software Licence Compliance
Software

Software Licence Compliance

Identifying unlicensed software, monitoring license usage, and ensuring that your organisation abides by its license agreements.

Read topic
Logo WHITE-cropped
phone 0845 565 2097
email info@celerity-uk.com
Vector

Transforming Technology. Empowering People.

QUICK LINKS
  • Technology Topics & Trends
  • Clients
  • Partners
LATEST BLOGS
  • Securing AI in Councils: Data, Shadow AI & Governance
  • Quantum Ready - Securing Data in the NHS
  • Is Your NHS Data Ready for the Quantum Age?

Ⓒ Celerity 2025 All Rights Reserved

Privacy

Terms

Anti-Slavery & Trafficking

Anti-Bullying

  • There are no suggestions because the search field is empty.