The impossible task of regulating IOT

Slides:



Advertisements
Similar presentations
Key Word Challenge This is when a computer uses services provided by another organisation’s computer systems. A computer hardware system which acts as.
Advertisements

Research Directions for the Internet of Things Supervised by: Dr. Nouh Sabry Presented by: Ahmed Mohamed Sayed.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
1 The Internet of Things. 2 Agenda IntroductionWhat is the Internet of Things?What are these “things”?What is.
Internet of Things (Ref: Slideshare)
1 The Features of the IoT and Some Extension Considerations China Communications Standards Association Subin Shen 21th meeting CJK.
Your Cyber Security: The scope of your risk is broad and growing To understand the nature of the risk landscape look at the presentations here today-begin.
Internet of Things. Creating Our Future Together.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
Data and Security Workshop Digital Transformation and Security Challenges Prof. Daniel Kofman Co-founder and Director of LINCS CEO of ICT4V International.
1 Enabling Smart Cities/Campuses to Serve the Internet of People Florence Hudson Senior Vice President & Chief Innovation Officer Internet2 TNC16 June.
Smart Home Environment
Alberto Paradisi- Vice-President - CPqD in IoT Week Belgrado - Innovation day Brazil Session: IoT Panorama and Collaboration.
Smart Law in Digital India - Legal, Regulatory & Governance Challenges July 24, 2016 Sajai Singh Partner J. Sagar Associates advocates & solicitors Ahmedabad.
Protecting Data, Sharing Information Graham Wakerley: Director
Anticipating tomorrow’s world, today… …or, being ‘Future Ready’
Security in Internet of Things Begins with the Data
Cyber Security – An Existential Threat? (IIC, Singapore)
EE5900 Cyber-Physical Systems
Internet of Things and Smart Cities
EE5900 Cyber-Physical Systems
A+: A Fresh Look at an Old Favorite
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Architecture for security monitoring in IoT environments
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Module I. Fundamentals of Information Systems:
General Data Protection Regulations and the IoT
Researcher and Lecturer Assistant at FCI Assiut University
Smart Car through IoT 라이 아샤리 리날디
North Carolina Law Review Symposium
GDPR Awareness and Training Workshop
Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.
How IIoT Makes Machines and Devices More Effective & Intelligent
Everything as a service
Algorithms for Big Data Delivery over the Internet of Things
ASP2 Healthcare Systems
National Mining University
IOT ppt
SMART BUILDING WITH INDOOR NAVIGATION SYSTEM -using iot
Intel's Public Policy Plan for the Internet of Things
Global Digital Signature Market (Size of USD $896.3million in 2017) to Witness 28.1% CAGR During 2018–2024
How Technology Is (R)evolutionizing Communities
How Technology Is (R)evolutionizing Communities
National Cyber Strategy Preparedness: 8 Preparatory Questions
Mobile edge computing Report by Weiqing huang.
Mobile Commerce and the Internet of Things
Internet of Things Vulnerabilities
Yarden Avishai, Justin Heeren, Asaf Kanari, Melody Qiao Team 16
Internet Interconnection
The “Internet of things” (IoT)
General Topic Suggestions
Yarden Avishai, Justin Heeren, Asaf Kanari, Melody Qiao Team 16
Elecbits.
Internet of Things.
Smart Learning concepts to enhance SMART Universities in Africa
IT Megatrends that shape the Digital Future…
IPv6 For IoT Mahyar Tajdini, DUT, Dec 2016.
Internet of Things (IoT) for Industrial Development and Automation
IOT Acronym as “Internet Of Things”
Huge latent demand for housing in India
Global megatrends (relevant for our business)
MIS COURSE: CHAPTER 3 INFORMATION SYSTEMS, ORGANIZATIONS, AND STRATEGY
Internet of Things (IoT)
IoTs (Internet of Things)
LO1 - Know about aspects of cyber security
Welcome to The World of Internet of Things
Trust by Design: The Internet of Things
IoT: Privacy and Security
Presentation transcript:

The impossible task of regulating IOT Gadi Perl, research fellow The Federmann Cyber Security Center – Cyber Law Program

Definition The Internet of things (IoT) is the network of devices such as vehicles, and home appliances that contain electronics, software, actuators, and connectivity which allows these things to connect, interact and exchange data..

Convenience Safety Efficiency Why Connect? Convenience Safety Efficiency

Challenges Policy makers must, however, contend with growing pressure to become more innovative, open, collaborative, evidence based, and participatory (3) as the expectations of business and society change, technology becomes more pervasive, the old policy regime starts to show cracks, and efficiency and preparedness to deal with the technical and nontechnical implications of the introduction of new digital technologies? What are the risks for everybody involved? How might such initiatives align with other related programs?

Regulating privacy Privacy Who is on the other side? We are not sure who is gathering the information. Is it a person or a machine? Does it matter? Privacy What is gathered? Where will the information go? Where will it be used? Who is on the other side?

Why is privacy important Autonomy Democracy Necessary for defining relationships Necessary for formulating opinions. Enables personal development. Necessary for communities. Required for democratic discourse. Allows fringe. We start from the obvious fact that both perfect privacy and total loss of privacy are undesirable. Individuals mush be in some intermediate state… in order to maintain human relations, develop their capacities and sensibilities, create and grow, and even to survive. (Gavison)

Challenges to regulation Myriad of different devices Efficiency considerations Consent? Adaptation It is difficult to formulate rules to answer the myriad types of connected devices. Cameras, Sensors, GPS… Smart-City projects are considered necessary for a growing metropolis Information gathered may be detrimental to privacy. GDPR rules are based on the idea of consent to forgo privacy. People may be manipulated by circumstances to agree. Terms of use are difficult to understand. Long term relationship are difficult to rescind. How do we treat mechanized gathering without human intervention.

Sensors Connectivity Mechanical Vehicle Driving Algorithms Self driving vehicles Sensors Mechanical Vehicle Connectivity Driving Algorithms Identifiable Issues: Location of Cameras. Types of cameras and amount of usage. Data retention. Security and Cybersecurity.

Thank you Gad.perl@gmail.com