SlideShare a Scribd company logo
1 of 2
Download to read offline
FTC Internet of Things (IoT) Report Focuses on Security and Consumer
Expectations
March 11, 2015
by Kim Verska
In January, the Federal Trade Commission (FTC) released a detailed report, “Internet of Things: Privacy &
Security in a Connected World”. The FTC’s Report urges product designers and manufactures to adopt best
practices including a strong focus on data security and upholding consumer expectations. For purposes of FTC
regulation, the IoT includes any consumer device – other than computers, smartphones or tablets – that connect
and store data via the Internet. This growing area includes diverse products from heart pacemakers to “smart”
appliances that collect and transmit user data over the Internet in the name of household efficiency. IoT
presents many challenges for government regulators, including rapidly advancing technology and the potential
for widespread collection of sensitive consumer medical information.
To address these challenges, the FTC Report attempts to strike a balance between prescriptive rules and more
flexible guidelines. In terms of prescriptive rules, some of the best practices FTC urged include “security by
design” and data minimization. FTC will evaluate IoT devices on whether data security appears to have been
considered as an integral design principle (or as a later add-on), and whether the devices collect more data than
is strictly necessary for their intended purposes. During FTC’s comment period, some industry representatives
had criticized FTC’s proposed emphasis on “security by design” and data minimization as potentially stifling
innovation and lacking sufficient cost/benefit analysis. They noted that what may be needed for security of a
pacemaker may not be needed for less sensitive devices. Less controversial was the FTC’s direction that IoT
device makers strive to meet the reasonable expectations of consumers regarding collection and use of personal
data – expectations that vary from device to device. This regulatory standard is arguably more flexible, able to
evolve alongside IoT technologies, and potentially less likely to become outdated quickly.
While IoT device makers are naturally those most concerned about the approach FTC is taking, any company
desiring a high level of regulatory compliance regarding consumer personal data practices can benefit from
application of the Report’s recommendations. The Report nicely encapsulates the FTC’s general regulatory
approach with respect to its “unfair and deceptive trade practices” enforcement over the past decade. As the
Report illustrates, application of a single set of rules to a diverse and changing set of circumstances and
technologies can be very challenging, and consumer product manufacturers will benefit from the advice of
legal counsel experienced in FTC privacy matters.
Author Kim Verska is a Certified Information Privacy Professional (US) through the
International Association of Privacy Professionals and a Partner in Culhane Meadows’ Atlanta office. She is
a frequent speaker regarding evolving legal issues for the technology industry and other businesses and can be
reached at kverska@culhanemeadows.com

More Related Content

What's hot

Chapter 3.docx
Chapter 3.docxChapter 3.docx
Chapter 3.docxAmir Khan
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
RT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected thingsRT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected thingsjournalBEEI
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTvishal dineshkumar soni
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of ThingsIRJET Journal
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
 
A Survey on the applications of IoT: an investigation into existing environme...
A Survey on the applications of IoT: an investigation into existing environme...A Survey on the applications of IoT: an investigation into existing environme...
A Survey on the applications of IoT: an investigation into existing environme...TELKOMNIKA JOURNAL
 
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET Journal
 
Internet of Things TDC 2013
Internet of Things   TDC 2013Internet of Things   TDC 2013
Internet of Things TDC 2013Cezar Taurion
 
The adoption of bitcoins technology: The difference between perceived future ...
The adoption of bitcoins technology: The difference between perceived future ...The adoption of bitcoins technology: The difference between perceived future ...
The adoption of bitcoins technology: The difference between perceived future ...IJECEIAES
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Challenges and Opportunities of Internet of Things in Healthcare
Challenges and Opportunities of Internet of Things in Healthcare  Challenges and Opportunities of Internet of Things in Healthcare
Challenges and Opportunities of Internet of Things in Healthcare IJECEIAES
 
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...IRJET Journal
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureIJAEMSJORNAL
 
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IJNSA Journal
 

What's hot (20)

Chapter 3.docx
Chapter 3.docxChapter 3.docx
Chapter 3.docx
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
RT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected thingsRT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected things
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of Things
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
Internet of Things (IoT): Readme
Internet of Things (IoT): ReadmeInternet of Things (IoT): Readme
Internet of Things (IoT): Readme
 
A Survey on the applications of IoT: an investigation into existing environme...
A Survey on the applications of IoT: an investigation into existing environme...A Survey on the applications of IoT: an investigation into existing environme...
A Survey on the applications of IoT: an investigation into existing environme...
 
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...
 
Internet of Things TDC 2013
Internet of Things   TDC 2013Internet of Things   TDC 2013
Internet of Things TDC 2013
 
The adoption of bitcoins technology: The difference between perceived future ...
The adoption of bitcoins technology: The difference between perceived future ...The adoption of bitcoins technology: The difference between perceived future ...
The adoption of bitcoins technology: The difference between perceived future ...
 
internet of things
internet of thingsinternet of things
internet of things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Challenges and Opportunities of Internet of Things in Healthcare
Challenges and Opportunities of Internet of Things in Healthcare  Challenges and Opportunities of Internet of Things in Healthcare
Challenges and Opportunities of Internet of Things in Healthcare
 
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT Infrastructure
 
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
 

Similar to FTC Internet of Things Article

The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115Devaraj Sl
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfyashapnt
 
Gilbert + Tobin Innovation Insights
Gilbert + Tobin Innovation InsightsGilbert + Tobin Innovation Insights
Gilbert + Tobin Innovation InsightsSue-Ann Wilson
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONJohn Pinson
 
IoT - RTD WHITE PAPER SquaredOnline
IoT - RTD WHITE PAPER SquaredOnlineIoT - RTD WHITE PAPER SquaredOnline
IoT - RTD WHITE PAPER SquaredOnlineFranceschiniLaura
 
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IRJET Journal
 
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IRJET Journal
 
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
Anonos  FTC Comment Letter Big Data: A Tool for Inclusion or ExclusionAnonos  FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or ExclusionTed Myerson
 
Companies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next stepsCompanies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next stepsThe Economist Media Businesses
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technologyEzraGray1
 
How digital technology is shaping the future of marthab
How digital technology is shaping the future of marthabHow digital technology is shaping the future of marthab
How digital technology is shaping the future of marthabArgelich Networks
 
The Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxThe Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxjmindy
 
FTC Balances Privacy, Connectivity Needs
FTC Balances Privacy, Connectivity NeedsFTC Balances Privacy, Connectivity Needs
FTC Balances Privacy, Connectivity NeedsPatton Boggs LLP
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Joe Orlando
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyEricsson
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesCompTIA
 

Similar to FTC Internet of Things Article (20)

The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
 
Gilbert + Tobin Innovation Insights
Gilbert + Tobin Innovation InsightsGilbert + Tobin Innovation Insights
Gilbert + Tobin Innovation Insights
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
 
IoT - RTD WHITE PAPER SquaredOnline
IoT - RTD WHITE PAPER SquaredOnlineIoT - RTD WHITE PAPER SquaredOnline
IoT - RTD WHITE PAPER SquaredOnline
 
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
 
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
IoT, Big Data and AI Applications in the Law Enforcement and Legal System: A ...
 
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
Anonos  FTC Comment Letter Big Data: A Tool for Inclusion or ExclusionAnonos  FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
 
Companies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next stepsCompanies, digital transformation and information privacy: the next steps
Companies, digital transformation and information privacy: the next steps
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Io t whitepaper_5_15_17
Io t whitepaper_5_15_17Io t whitepaper_5_15_17
Io t whitepaper_5_15_17
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
An American Legal Perspective
An American Legal PerspectiveAn American Legal Perspective
An American Legal Perspective
 
How digital technology is shaping the future of marthab
How digital technology is shaping the future of marthabHow digital technology is shaping the future of marthab
How digital technology is shaping the future of marthab
 
The Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxThe Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docx
 
FTC Balances Privacy, Connectivity Needs
FTC Balances Privacy, Connectivity NeedsFTC Balances Privacy, Connectivity Needs
FTC Balances Privacy, Connectivity Needs
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked Society
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 

FTC Internet of Things Article

  • 1. FTC Internet of Things (IoT) Report Focuses on Security and Consumer Expectations March 11, 2015 by Kim Verska In January, the Federal Trade Commission (FTC) released a detailed report, “Internet of Things: Privacy & Security in a Connected World”. The FTC’s Report urges product designers and manufactures to adopt best practices including a strong focus on data security and upholding consumer expectations. For purposes of FTC regulation, the IoT includes any consumer device – other than computers, smartphones or tablets – that connect and store data via the Internet. This growing area includes diverse products from heart pacemakers to “smart” appliances that collect and transmit user data over the Internet in the name of household efficiency. IoT presents many challenges for government regulators, including rapidly advancing technology and the potential for widespread collection of sensitive consumer medical information. To address these challenges, the FTC Report attempts to strike a balance between prescriptive rules and more flexible guidelines. In terms of prescriptive rules, some of the best practices FTC urged include “security by design” and data minimization. FTC will evaluate IoT devices on whether data security appears to have been considered as an integral design principle (or as a later add-on), and whether the devices collect more data than is strictly necessary for their intended purposes. During FTC’s comment period, some industry representatives had criticized FTC’s proposed emphasis on “security by design” and data minimization as potentially stifling innovation and lacking sufficient cost/benefit analysis. They noted that what may be needed for security of a pacemaker may not be needed for less sensitive devices. Less controversial was the FTC’s direction that IoT device makers strive to meet the reasonable expectations of consumers regarding collection and use of personal data – expectations that vary from device to device. This regulatory standard is arguably more flexible, able to evolve alongside IoT technologies, and potentially less likely to become outdated quickly. While IoT device makers are naturally those most concerned about the approach FTC is taking, any company desiring a high level of regulatory compliance regarding consumer personal data practices can benefit from application of the Report’s recommendations. The Report nicely encapsulates the FTC’s general regulatory approach with respect to its “unfair and deceptive trade practices” enforcement over the past decade. As the Report illustrates, application of a single set of rules to a diverse and changing set of circumstances and technologies can be very challenging, and consumer product manufacturers will benefit from the advice of legal counsel experienced in FTC privacy matters.
  • 2. Author Kim Verska is a Certified Information Privacy Professional (US) through the International Association of Privacy Professionals and a Partner in Culhane Meadows’ Atlanta office. She is a frequent speaker regarding evolving legal issues for the technology industry and other businesses and can be reached at kverska@culhanemeadows.com