ARTICLE
15 November 2018

How Many Things Do You Have On The Internet Of Things? And More Importantly, Are Your Things Safe From Cyber-Attack?

AG
Archer & Greiner P.C.

Contributor

Archer & Greiner is now Archer. But what matters most is what remains the same. Our new name still represents an unwavering commitment to delivering large-firm expertise with small-firm attention—no matter the size of the client. It’s a philosophy that’s helped us grow into one of the largest and most trusted law firms in the Mid-Atlantic region, serving businesses and individuals throughout the region and in a growing number of other states and jurisdictions. With a network of regional offices from Delaware to New York, Archer has more than 175 lawyers practicing in all major legal disciplines including corporate, labor, commercial litigation, family, real estate and many more.
So as remote diagnosis of heart attack is becoming reality, for example, all of the problems associated with cybersecurity attacks must be addressed by a whole new range of potential victims.
United States Media, Telecoms, IT, Entertainment
To print this article, all you need is to be registered or login on Mondaq.com.

Merriam Webster defines the Internet of Things ("IoT") this way: "the networking capability that allows information to be sent to and received from objects and devices (such as fixtures and kitchen appliances) using the Internet." While refrigerators and porch lights are easy to see as "things" that might be connected up to the Internet and thereby controlled at a distance, the IoT is much more than a way for turning off the air conditioning when one has already left town for vacation. Currently it is estimated that approximately ten billion devices are connected up to the IoT and that that number will triple in about three years.

While consumer devices are most commonly associated with the IoT, technological advances are rapidly bringing industrial systems and medical care facilities into the IoT, and therefore into the glaring spotlight of the possibility of cyber-attack, just as the effect that that glare has had on the banking and retail sectors of the economy. So as remote diagnosis of heart attack is becoming reality, for example, all of the problems associated with cybersecurity attacks must be addressed by a whole new range of potential victims.

As a result, in 2015 the Federal Trade Commission ("FTC") published a report that called on IoT companies to ensure that data collection, storage, and processing of customer data must be safe from cyber-attack.

While the FTC has yet to issue regulations in this area, the Information Technology Laboratory ("ITL") at the National Institute of Standards and Technology ("NIST"), an agency of the United States Department of Commerce, has published a draft report entitled "Considerations for Managing Internet of Things (IoT) Cybersecurity Risks and Privacy Risks." In the abstract of the draft, the ITL states: "Many organizations are not necessarily aware of the large number of IoT devices they are already using and how IoT devices may effect cybersecurity and privacy risks differently than conventional information technology (IT) devices do. The purpose of this publication is to help federal agencies and other organizations better understand and manage the cybersecurity and privacy risks associated with their IoT devices throughout their lifecycles."

Suffice to say, the draft is a treasure trove of information, even before being finalized, for any organization, corporation, or group that relies on devices that might not so obviously be "things" in the IoT, especially to understand and mitigate the risks inherent in three areas: (i) protecting device security; (ii) protecting data security: and (iii) protecting the privacy of individuals. The report is accessible at this link.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

We operate a free-to-view policy, asking only that you register in order to read all of our content. Please login or register to view the rest of this article.

See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More