INTRODUCTION
On Trust and AI

Copyright © 2025 by Alexander Feick
All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means—including photocopying, recording, or other electronic or mechanical methods—without the prior written permission of the author, except in the case of brief quotations embodied in critical reviews and certain other non-commercial uses permitted by copyright law.
For permission requests, contact: [email protected] or visit alexander.feick.ca.
First Edition
South Frontenac, Ontario
Printed in Canada
Book design by Mark V. Ponce
Cover art by Mark V. Ponce
Book imagery by Rob Pittman
The information contained in this book is provided strictly for educational, informational, and general guidance purposes only. This publication does not constitute professional advice of any kind, including but not limited to cybersecurity, legal, business, technical, or regulatory advice.
The author and/or publisher make no representations or warranties of any kind, express or implied, regarding the accuracy, completeness, reliability, suitability, or availability of the information contained herein. All information is provided "as is" without warranty of any kind.
In no event shall the author and/or publisher be liable for any direct, indirect, incidental, special, consequential, or punitive damages arising out of or relating to the use of this information, including but not limited to business interruption, loss of profits, data loss, security breaches, or any other commercial damages or losses.
Readers are strongly advised to consult with qualified cybersecurity professionals, legal counsel, compliance experts, and other appropriate advisors before implementing any strategies, frameworks, or recommendations discussed in this book. The rapidly evolving nature of AI technology and regulatory landscape requires current, specific professional guidance.
References to specific companies, products, services, or technologies do not constitute endorsements. All examples are provided for illustrative purposes only and should not be construed as recommendations for specific implementations.
The field of AI security and governance is rapidly evolving. Information that appears current at the time of publication may become outdated. Readers should verify all information and seek current professional guidance before making any business decisions.
Every organization's circumstances are unique. The frameworks and approaches discussed may not be suitable for all situations, industries, or regulatory environments.
By reading this book, you acknowledge that you understand and agree to these limitations and disclaimers.