Internet of Things Series Part II: Security Concerns

Business Law Revision Legal

For many devices used today, a certain amount of personal information needs to be provided for the device or application to function properly. For example, to get more accurate information from fitness trackers, the user often needs to provide details about their height, weight, gender, activity level, and so forth. We’ve already addressed the possible privacy concerns associated with providing this information – selling data to third parties, data falling into the wrong hands, etc. The security concerns focus on who can gain access to this information, and what can we do to prevent it.

In an article by CMS Wire they reported that 80 percent of these devices failed to require adequate passwords, often resulting in users having no or very weak passwords. The same study reported that 70 percent of devices used unencrypted networks for transferring the data. This means that data is being transferred without any form of protection that would keep it from being picked up by the average computer hacker. Other security concerns the study found included the need for improved user interfaces that weren’t so easy to be hacked and the use of encryption when users download updates for their devices. Without this encryption, hackers can gain access to the user’s profile while an update is being downloaded and installed.

The positive side of this is that with all of these security concerns being raised and brought to the forefront, many companies are taking action now to make changes and protect their users’ private information moving forward. In addition to steps being taken by companies producing these devices, a not-for-profit organization has been established known as the Internet of Things Security Foundation (IoTSF). The IoTSF works to raise awareness and provides resources to companies to help them discover the vulnerabilities and flaws in their devices and correct them.

For more information regarding the IoT and the security concerns stemming from the open flow of data among these devices contact Revision Legal’s Internet attorneys through the contact form or call 855-473-8474.

Image credit to Flickr user reynermedia

Extra, Extra!
Recent Posts

Does the AI-Copyright Legal Fight Represent a National Security Threat?

Does the AI-Copyright Legal Fight Represent a National Security Threat?

Copyright

The holders of copyrights for newspapers, magazines, books, and other publications are involved in numerous legal battles with owners of AI modules over alleged copyright infringement. The plaintiff copyright owners claim that the AI large language modules have been trained on huge quantities of copyrighted materials without permission and — most importantly — without payment. […]

Read more about Does the AI-Copyright Legal Fight Represent a National Security Threat?

How Does Buy-Sell Insurance Work For An Owners’ Agreement?

How Does Buy-Sell Insurance Work For An Owners’ Agreement?

Corporate

The owners of most small, closely-held businesses negotiate and sign some form of an “Owner’s Agreement.” An important part of such Agreements is the “Buy-Sell” provisions. These are often some of the most difficult to negotiate. The gist of the buy-sell part of the Owners’ Agreement is to establish the rules for what happens if […]

Read more about How Does Buy-Sell Insurance Work For An Owners’ Agreement?

Status on Social Media Moderation Statutes and Cases

Status on Social Media Moderation Statutes and Cases

Internet Law

Social media content moderation by technology platforms was one of the “hot” legal topics in 2023-2024. Three States — California, Texas, and Florida — passed different statutes to either require more content moderation (California) or to limit such moderation (Texas and Florida). All the statutes, in one way or another, demanded more transparency and information […]

Read more about Status on Social Media Moderation Statutes and Cases

Put Revision Legal on your side