SlideShare a Scribd company logo
1 of 66
Legal Risks of Operating in
the World of Connected
Technologies (IoT)
Business Law Training
April 12, 2018
Linda Emery Heather Buchta
-2-
What is the Internet of Things?
 It's not new – term was first used in the late 90's
 "ubiquitous ecosystem of sensors and connected
devices"
 "cyber physical systems"
 "system of systems"
 "smart systems that include co-engineered
interacting networks of physical and computational
components"
 "internet-enabled appliances to an existing
infrastructure of computers and mobile devices"
-3-
What is it really?
 "interconnection of computing devices embedded in
everyday objects via the Internet to send and receive
data"
 "sprawling set of technologies and use cases that has
no clear, single definition"
 Device + software + connectivity + big data = IoT
-4-
What is the Internet of Things?
 Over 26 Billion
by 2020
 Smart Home
 Connected
Health
 Connected
Cars
 Connected
Industrial
-5-
Five Largest Categories
 Connected Vehicles
 Connected Health Care Devices
 Connected Homes
 Industrial internet (transportation, oil & gas, and
healthcare)
 Vehicles
-6-
What does it look like?
-7-
Why the sudden rise?
Computing power
Bandwidth
Cheap data storage
-8-
Why is it different?
 Functionality
 It's "smart"
 Functions/processes without being told
 Communications capability
 Creates risk and security vulnerabilities
 Intellectual property
 Embedded software – copyrights and patents
 Laws favor the author/inventor/developer
 Who owns data??
 Result is complexities in implementation and
development
-9-
Legal Risks
Regulatory
Data Privacy
Data Security
Product Liability
Industry Self-Regulation
-10-
What's at Risk
 Damage to Reputation & Loss of Goodwill
 Investigations and Incident Response
 Legal Fees, Notification Costs, Call Centers
 Loss of Competitive Advantage
 Lost Sales, Revenues & Profits
 Lawsuits/Class Actions
 Regulatory Fines
-11-
Federal Trade Commission (FTC)
-12-
FTC Recommendations
 FTC Recommendations for Data Security and Privacy
Practices When Selling Connected Products
 https://www.ftc.gov/system/files/documents/reports
/federal-trade-commission-staff-report-november-
2013-workshop-entitled-internet-things-
privacy/150127iotrpt.pdf
-13-
IoT is a Team Sport
Multidisciplinary Team. The FTC recommends the
company’s
 Hardware designers and engineers
 Software and app developers
 IT security personnel
 Legal and compliance
 HR
 Marketing
-14-
Security By Design
 Security By Design. Companies need to include
security by design, not as an after thought
 Don’t Assume Safety: Product design should not assume
safety of a customer’s home network
 Testing: Test the security of devices before launching a
product
-15-
Risks During Product Testing
 Third Party Products. Check for vulnerabilities in
third-party components integrated into your
products.
 Relock Doors. Verify that if you turn off security
measures during testing, you switch them back on
before going live.
 Back Doors. Check whether you have closed back
doors through which hackers could access
information or gain control of the device.
-16-
Multiple Levels of Security
Multiple Levels of Security. Companies should
identify significant risks within their systems at
every level
Implementing security measures at several
levels
Identify security soft spots
-17-
Data Mapping and Collection
 What Data is Collected: Inventory of Information. If a
device collects and transmits data, have an up-to-
date inventory of the kinds of information in your
possession.
 Why are you Collecting It?
 Where are you storing it?
 How are you storing it? – Combinations of PII and
Connected Data?
 How long are you storing it?
-18-
Best Practices
 An understanding of where your data is held
 Clear privacy policy which you follow
 Strong IT and product security practices
 A data breach plan and team
 High engagement by the Company on privacy issues
on an enterprise-wide basis
-19-
Consumer Product Safety Commission
(CPSC)
 CPSC “impute[s] to the subject firm knowledge of
product safety related information received by an
official or employee of a subject firm capable of
appreciating the significance of the information.”
 Does the data collected by connected devices
constitute “knowledge of product safety related
information?”
 If a manufacturer chooses not to analyze information
available to it, can it then claim it was not “capable of
appreciating the significance” of isolated reports?
-20-
Homeland Security Report
Traditional product
liability law can be
expected to apply
Liability for inadequate
attention to security
-21-
DHS Report
 Manufacturers should design with worst-case
scenarios in mind. “Developers should build IoT
devices to fail safely and securely, so that the failure
does not lead to greater systemic disruption.”
 IoT devices should be designed so they can be
updated if security flaws are found. “In the absence
of the ability to deploy security updates,
manufacturers may be faced with the decision
between costly recalls and leaving devices with
known vulnerabilities in circulation.”
-22-
Medical Devices
 By 2020, 40% of IoT-related technology will be health
related – more than any other category
 Expect uptick in medical device litigation
 “Where manufacturers, healthcare providers and
consumers see innovation, functionality, integration
and an all-around more capable product, plaintiffs’
firms see potential failure on a mass basis and dollar
signs.” MEDICAL DEVICE LITIGATION The “Internet of
Things” Is Coming: 11 No. 3 In-House Def. Q. 26
-23-
Food & Drug Administration
 Food and Drug Administration issued final guidance
regarding the need for post-market management of
cybersecurity in medical devices
 https://www.fda.gov/downloads/MedicalDevices/Dev
iceRegulationandGuidance/GuidanceDocuments/UC
M482022.pdf
-24-
Food & Drug Administration
 January 2016, the FDA released draft guidance for
post-market management of cybersecurity in medical
devices.
 Developer to address cybersecurity throughout the
product life cycle, including the design, development,
production, distribution, deployment, and
maintenance.
 Cybersecurity risks to medical devices are evolving
and therefore it is not possible to completely mitigate
risks through premarket controls alone.
-25-
National Highway Traffic Safety
Administration
Federal Automated Vehicles Policy
https://www.nhtsa.gov/sites/nhtsa.dot.gov/files/federal_automated_vehicles_policy.pdf
Federal Motor Vehicle Safety Standards for
Automated Vehicles
-26-
Autonomous Vehicle Laws
 Some states have
specific laws covering
autonomous vehicles:
District of Columbia,
California, Florida,
Michigan, Nevada,
North Dakota and
Tennessee.
-27-
NIST Guidelines
 Require compliance with NIST Guidelines
https://www.nist.gov/cyberframework
 Framework for Improving Critical Infrastructure
Cybersecurity, National Institute of Standards and
Technology, February 12, 2014 (Version 1.0)
 Currently on draft version 2 of Version 1.1
-28-
Underwriters Laboratory
 UL 2900 - Cybersecurity Assurance Program (CAP) UL
2900 is not a standard. It is an outline for the
eventual development of a standard.
 Requirements regarding the vendor’s risk
management process for its product.
 Designed to help vendors minimize cybersecurity
risks by assessing software vulnerabilities, minimize
exploitation, address known malware, review security
controls, and increase security awareness.
-29-
IoT Product Liability Risks
-30-
Software and Sensors
Software and sensors are critical component
parts suppliers in IoT
They are both “component parts suppliers”
Significant product liability exposure
-31-
IoT Product Claims
Was the misuse,
modification or
manipulation foreseeable?
Who is at fault?: The hacker,
the manufacturer, the
software provider, the
sensor manufacturer or the
owner who failed to
properly secure the
product?
-32-
3 Product Liability Issues With IoT
Product failure
Security breach
Data destruction, manipulation, or alteration
-33-
Risk 1: Product Failure
 Product malfunction which causes personal injury or
property damage
 Nest: Nest thermostat suffered a software
malfunction, drained the battery and shut down the
Nest device
 Harm: Cold homes, water pipe damage, and concerns
about infants exposed to cold temperatures
 Lawsuit: Although Nest fixed the problem, a law firm is
looking for plaintiffs for personal injury or property
damage lawsuits
-34-
Risk 2: Security Breach
 Claims of physical injury caused by a hack or other
security breach
 Jeep: White Hat Hackers remotely accessed a Jeep’s
controls through the vehicle’s communications
system
 Result: Chrysler recalled 1.4 million vehicles in 2015
 Legal: Subject of a government investigation
-35-
Risk 3: Data Alteration
 An IoT product/server is hacked and personal data
downloaded and used by hacker
 California Hospital: suffered a Denial of Service Attack in
2016. Hackers held the hospital’s IT system hostage for
10 days
 Result: Hospital paid hackers 17,000 bitcoin for
encryption key
 Legal Risk: Critical patient care services would be
compromised. Medical records could have been altered
and devices, such as infusion pumps for chemotherapy,
would become vulnerable to dosage manipulations.
-36-
Who is Liable for IoT Losses?
Software developer
Sensor manufacturer
Manufacturer
Retailer
Consumer
-37-
Who Is At Fault?
 Artificial Intelligence: Computer algorithms decide
vehicle actions
 Auto-crash cases: Move from human negligence to
product-liability claims
 When manufacturers’ algorithms – created months
and years in advance – can make driving decisions
that may have life and death implications.
-38-
Open Issues
 Harder to investigate
 More difficult to prove liability
 New types of experts to investigate?
 Products themselves will give much more information
-39-
Discovery and Experts
Software issues make discovery more
complicated
Need for experts regarding both software and
hardware
-40-
Software Developers
Software developer for an IoT product is likely
vulnerable to claims
Developers are used to speed to market as the
benchmark
Solution: Privacy (and safety) by design
-41-
Software Vendors
 Software licensors will not be protected against third-
party injury claims
 Many software vendors:
 don’t understand their product liability exposure to claims
for bodily injury and property damage caused by third
parties; or
 have failed to provide for such exposures in their
agreements
 Software vendors won’t be protected merely by
contracts with the manufacturers of the end products
-42-
Consumer Responsibility
What if the consumer
fails to update their
software or a password?
What if the customer
downloads malware?
-43-
Failure to Warn
Liability may exist if a manufacturer of a
product knew or should have known of a
potential danger and failed to give adequate
directions or warnings of a potential danger
Connected devices may provide manufacturers
more metrics and information about their
connected devices and the manner in which
they are being used
-44-
Big Data Risk
We are retaining massive volumes of data
Retained information may impact the
manufacturer’s duty to warn
When manufacturing and marketing new
products, companies need to determine what
information is important to retain
-45-
IoT Litigation
IoT lawsuits are “on the rise”
Most cases are still “unresolved or have been
dismissed because courts couldn’t find injury”
-46-
Cahen v. Toyota Motor Corp.
 In Cahen v. Toyota Motor Corp., 3:15-cv-01104 (N.D.
Cal. March 10, 2015), Plaintiffs alleged auto
manufacturers equipped their vehicles with computer
technology that is vulnerable to hacking
 Hackers can communicate remotely with the
computers controlling vehicle functions, resulting in a
complete loss of driver control over steering,
accelerating and braking
 Plaintiffs alleged manufacturers were aware of
security vulnerabilities, but represented the products
as safe
-47-
IoT Lawsuits – Auto (continued)
 Defendants argued “that plaintiffs do not allege any
hacking incidents that have taken place outside of
controlled settings, and that the entire threat rests on
the speculative premise that a sophisticated third
party cybercriminal may one day successfully hack
one of plaintiffs’ vehicles.”
 The court agreed, citing potential risk of future
hacking was not an injury in fact. Plaintiffs have
appealed the dismissal to the Ninth Circuit.
-48-
Flynn vs. FCA
 Chrysler Group. In Flynn v. FCA US LLC., 3:15-cv-855
 (S.D. Ill. Aug. 4, 2015):
 Plaintiffs alleged security flaw in “infotainment” centers manufactured
by Harman International Industries for certain Chrysler vehicles.
 Plaintiffs alleged infotainment system “exceedingly hackable,” permits
hackers to “remotely take control” of steering, acceleration and
braking, and lacks the ability quickly and effectively for software
security flaws to be “patched.”
 Court held plaintiffs had standing to sue for damages for diminished
value of car because “the ongoing vulnerabilities have reduced the
market value of their vehicles.”
 2015 article in Wired drew attention to vulnerability on sales price.
-49-
Home Security Devices
 Baker v. ADT Corp., No. 2:15-cv-02038 (C.D. Ill. Nov. 9,
2014). Plaintiff filed class action alleging ADT’s
wireless security and monitoring equipment could be
remotely turned on or off using technology readily
available to the public.
 Plaintiff alleged his system was hacked at least twice
by an unauthorized third party, which “caused the
system to be falsely triggered, which in turn caused
ADT to contact Plaintiff and have the police called to
Plaintiff’s home.”
-50-
Medical Devices
 Ross v. St. Jude Medical Inc., No. 2:16-cv-06465 (C.D.
Cal. Aug. 26, 2016):
 Plaintiff challenges a variety of St. Jude Medical’s
implants — including pacemakers, defibrillators and
heart resynchronizers — that use
radiofrequency wireless technology.
 Plaintiff claims that the devices are exposed to
potential attacks in which hackers could disable the
device or drain its battery.
-51-
Medical Devices (continued)
 The technology allows the implanted devices to be
monitored remotely. The plaintiff alleged that the
company owed the patients a “duty of care to ensure
that the devices safeguarded against potential
hacking...”
 “It is foreseeable that if defendants did not take
reasonable security measures, the devices could be
accessed, viewed or controlled by unauthorized
persons.”
 Plaintiff voluntarily dismissed the case, without
prejudice, in December 2016.
-52-
Risk Reduction Strategies
-53-
Culture of Security
Senior Management
Employee Training
-54-
Contracts and Internal Policies
 Contractual protections between manufacturers and
software developers to properly balance and shift the
potential third-party liability exposures
 Disclaimers of liability by consumers?
 Privacy Policies and Just in Time Privacy Notices
 Incident Response Plans
-55-
Prior to Development
What type of development is taking place?
 Hiring a contractor to develop
 Being hired as a contractor to develop
 Jointly developing
Confidentiality is not the same as ownership
 Development brings risk that is not addressed in
NDAs
 Ownership and assignments need to be
particularly spelled out, along with risk
-56-
Development Considerations
Data Privacy
 Privacy by Design
 Data "ownership"
 Data use
 Who has the data privacy obligations?
 Collectors
 Processors
-57-
Development Legal Risks
Product Liability
 Product Failure
 Software Developer
 Sensor Manufacturer
 Manufacturer
 Retailer
 Consumer
 Data Security
 Breach
 Data Integrity
-58-
Document Lifecycle of an IoT
Development
 NDA
 LOI/MOU – only if serves a business purpose
 Usually nonbinding
 Development Agreement – who is hiring who?
 Contributions
 Ownership
 Clearance
 Delivery obligations – fees, timelines, expenses, specs
 Liability
 Support/maintenance – only maybe
 End result is usually a working prototype
-59-
Document Lifecycle of an IoT
Development (cont'd)
 Commercialization Agreement
 Production/distribution
 Marketing/sales
 Hosting
 Data collection/use/ownership
 Support/maintenance
 End Users
 Terms and conditions
 End user license agreements
 Privacy policies
-60-
Development Considerations
Ownership and Clearance
 Open Source/Third Party Code
 Risk of Infringement
In-Market Complexities
 Ongoing Support
 Ongoing Maintenance
 Subsequent Owners
-61-
Laws and Standards Bodies
Laws and regulations
Standards organizations
Industry groups
-62-
Data Retention
Carefully
consider data
retention needs
and retention
practices
-63-
Security Protections
Warnings
Notices of security
patches and updates
Strict password
requirements
Disclaim liability for
user negligence
-64-
Lifecycle
Limited access to devices
Monitor products through lifecycle and apply
patches
-65-
Technical Protections
Kill switch in connected devices
Questions?
Linda Emery Heather Buchta
414-277-3038 602-229-5228
linda.emery@quarles.com heather.buchta@quarles.com
© 2018 Quarles& Brady LLP - This document provides information of a general nature. None of the
information contained herein is intended as legal advice or opinion relative to specific matters, facts,
situations or issues. Additional facts and information or future developments may affect the subjects
addressed in this document. You should consult with a lawyer about your particular circumstances
before acting on any of this information because it may not be applicable to you or your situation.

More Related Content

What's hot

Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkClearnetwork
 
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...GlobalSign
 
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODCamilo Fandiño Gómez
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceRapid7
 
Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)Salim Hosen
 
IoT Analytics From Data to Decision Making - Trends & Challenges
IoT Analytics From Data to Decision Making- Trends & ChallengesIoT Analytics From Data to Decision Making- Trends & Challenges
IoT Analytics From Data to Decision Making - Trends & ChallengesDr. Mazlan Abbas
 
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...IRJET Journal
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Business Finland
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Securitysyrinxtech
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devicesiSSAL
 
Viscount Systems (OTCQB:VSYS) Presentation
Viscount Systems (OTCQB:VSYS) PresentationViscount Systems (OTCQB:VSYS) Presentation
Viscount Systems (OTCQB:VSYS) PresentationInvestorideas.com
 
IIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingIIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingLisa Waddell
 
The IIC Connectivity Framework for IIoT
The IIC Connectivity Framework for IIoTThe IIC Connectivity Framework for IIoT
The IIC Connectivity Framework for IIoTJohn Breitenbach
 
Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017Matthew Bailey
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
The Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the ManufacturerThe Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the ManufacturerUSA Firmware, LLC
 
DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...IJECEIAES
 

What's hot (19)

Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
 
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
 
Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
 
Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)
 
IoT Analytics From Data to Decision Making - Trends & Challenges
IoT Analytics From Data to Decision Making- Trends & ChallengesIoT Analytics From Data to Decision Making- Trends & Challenges
IoT Analytics From Data to Decision Making - Trends & Challenges
 
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
 
Automotive Hacking
Automotive Hacking Automotive Hacking
Automotive Hacking
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
Viscount Systems (OTCQB:VSYS) Presentation
Viscount Systems (OTCQB:VSYS) PresentationViscount Systems (OTCQB:VSYS) Presentation
Viscount Systems (OTCQB:VSYS) Presentation
 
IIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingIIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturing
 
The IIC Connectivity Framework for IIoT
The IIC Connectivity Framework for IIoTThe IIC Connectivity Framework for IIoT
The IIC Connectivity Framework for IIoT
 
Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
The Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the ManufacturerThe Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the Manufacturer
 
DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...
 

Similar to Legal Risks of Operating in the World of Connected Technologies (Internet of Things)

The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115Devaraj Sl
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
How digital technology is shaping the future of marthab
How digital technology is shaping the future of marthabHow digital technology is shaping the future of marthab
How digital technology is shaping the future of marthabArgelich Networks
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
Iot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrptIot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrptMarket Engel SAS
 
150127iotrpt
150127iotrpt150127iotrpt
150127iotrptmadhu ck
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Bernard Kufluk
 
Csp IoT dan hyde 18 p16 17
Csp IoT dan hyde 18 p16 17Csp IoT dan hyde 18 p16 17
Csp IoT dan hyde 18 p16 17dan hyde
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
Can you trust your smart building
Can you trust your smart buildingCan you trust your smart building
Can you trust your smart buildingDuncan Purves
 

Similar to Legal Risks of Operating in the World of Connected Technologies (Internet of Things) (20)

The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
An American Legal Perspective
An American Legal PerspectiveAn American Legal Perspective
An American Legal Perspective
 
How digital technology is shaping the future of marthab
How digital technology is shaping the future of marthabHow digital technology is shaping the future of marthab
How digital technology is shaping the future of marthab
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
150127iotrpt
150127iotrpt150127iotrpt
150127iotrpt
 
Iot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrptIot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrpt
 
150127iotrpt
150127iotrpt150127iotrpt
150127iotrpt
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)
 
Csp IoT dan hyde 18 p16 17
Csp IoT dan hyde 18 p16 17Csp IoT dan hyde 18 p16 17
Csp IoT dan hyde 18 p16 17
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
Dov Greenbaum, "Avoiding Regulation in the Medical Internet of Things"
Dov Greenbaum, "Avoiding Regulation in the Medical Internet of Things"Dov Greenbaum, "Avoiding Regulation in the Medical Internet of Things"
Dov Greenbaum, "Avoiding Regulation in the Medical Internet of Things"
 
IBM Xforce Q4 2014
IBM Xforce Q4 2014IBM Xforce Q4 2014
IBM Xforce Q4 2014
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Can you trust your smart building
Can you trust your smart buildingCan you trust your smart building
Can you trust your smart building
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
IoT PPT Deck
IoT PPT DeckIoT PPT Deck
IoT PPT Deck
 

More from Quarles & Brady

Protecting Designs Without Design Patents
Protecting Designs Without Design PatentsProtecting Designs Without Design Patents
Protecting Designs Without Design PatentsQuarles & Brady
 
2020 Wisconsin Insurance Case Law Year in Review
2020 Wisconsin Insurance Case Law Year in Review2020 Wisconsin Insurance Case Law Year in Review
2020 Wisconsin Insurance Case Law Year in ReviewQuarles & Brady
 
Interest Rate Swaps for Borrower’s Counsel
Interest Rate Swaps for Borrower’s CounselInterest Rate Swaps for Borrower’s Counsel
Interest Rate Swaps for Borrower’s CounselQuarles & Brady
 
2016 Year in Review: Recent Midwest Legal Decisions Impacting Real Estate and...
2016 Year in Review: Recent Midwest Legal Decisions Impacting Real Estate and...2016 Year in Review: Recent Midwest Legal Decisions Impacting Real Estate and...
2016 Year in Review: Recent Midwest Legal Decisions Impacting Real Estate and...Quarles & Brady
 
Key Bankruptcy Considerations Heading into a Recession
Key Bankruptcy Considerations Heading into a RecessionKey Bankruptcy Considerations Heading into a Recession
Key Bankruptcy Considerations Heading into a RecessionQuarles & Brady
 
Key Bankruptcy Considerations Heading into a Recession
Key Bankruptcy Considerations Heading into a RecessionKey Bankruptcy Considerations Heading into a Recession
Key Bankruptcy Considerations Heading into a RecessionQuarles & Brady
 
Emerging Trends in Commercial Mortgage Lending During COVID-19
Emerging Trends in Commercial Mortgage Lending During COVID-19Emerging Trends in Commercial Mortgage Lending During COVID-19
Emerging Trends in Commercial Mortgage Lending During COVID-19Quarles & Brady
 
Action Steps for Your Employee Benefits Plan During the Coronavirus Pandemic
Action Steps for Your Employee Benefits Plan During the Coronavirus PandemicAction Steps for Your Employee Benefits Plan During the Coronavirus Pandemic
Action Steps for Your Employee Benefits Plan During the Coronavirus PandemicQuarles & Brady
 
Coronavirus & COVID-19 Update
Coronavirus & COVID-19 UpdateCoronavirus & COVID-19 Update
Coronavirus & COVID-19 UpdateQuarles & Brady
 
The Tampa Office Celebrates 10 Years!
The Tampa Office Celebrates 10 Years!The Tampa Office Celebrates 10 Years!
The Tampa Office Celebrates 10 Years!Quarles & Brady
 
Guidance for Employers During the Evolving COVID-19 Pandemic
Guidance for Employers During the Evolving COVID-19 PandemicGuidance for Employers During the Evolving COVID-19 Pandemic
Guidance for Employers During the Evolving COVID-19 PandemicQuarles & Brady
 
Guidance for Employers During the Evolving COVID-19 Pandemic
Guidance for Employers During the Evolving COVID-19 PandemicGuidance for Employers During the Evolving COVID-19 Pandemic
Guidance for Employers During the Evolving COVID-19 PandemicQuarles & Brady
 
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...Quarles & Brady
 
A Practical Roadmap For Navigating Medical Staff Legal Nightmares In Current ...
A Practical Roadmap For Navigating Medical Staff Legal Nightmares In Current ...A Practical Roadmap For Navigating Medical Staff Legal Nightmares In Current ...
A Practical Roadmap For Navigating Medical Staff Legal Nightmares In Current ...Quarles & Brady
 
Medical Staff Structure And Bylaws: Current Trends And Best Practices
Medical Staff Structure And Bylaws: Current Trends And Best PracticesMedical Staff Structure And Bylaws: Current Trends And Best Practices
Medical Staff Structure And Bylaws: Current Trends And Best PracticesQuarles & Brady
 
Current Cases: Medical Staff Nightmares And Fairy Tales
Current Cases: Medical Staff Nightmares And Fairy TalesCurrent Cases: Medical Staff Nightmares And Fairy Tales
Current Cases: Medical Staff Nightmares And Fairy TalesQuarles & Brady
 
Employment and Telemedicine Arrangements Between Hospitals and Practitioners:...
Employment and Telemedicine Arrangements Between Hospitals and Practitioners:...Employment and Telemedicine Arrangements Between Hospitals and Practitioners:...
Employment and Telemedicine Arrangements Between Hospitals and Practitioners:...Quarles & Brady
 
Physician Employment and Medical Staff Matters - Fun Times For HR Directors!
Physician Employment and Medical Staff Matters - Fun Times For HR Directors!Physician Employment and Medical Staff Matters - Fun Times For HR Directors!
Physician Employment and Medical Staff Matters - Fun Times For HR Directors!Quarles & Brady
 
Understand the SECURE Act, the Repeal of the “Cadillac Tax” and Other Health ...
Understand the SECURE Act, the Repeal of the “Cadillac Tax” and Other Health ...Understand the SECURE Act, the Repeal of the “Cadillac Tax” and Other Health ...
Understand the SECURE Act, the Repeal of the “Cadillac Tax” and Other Health ...Quarles & Brady
 
Business Law Training: What’s Around the Corner? Eight Things We’re Watching ...
Business Law Training: What’s Around the Corner? Eight Things We’re Watching ...Business Law Training: What’s Around the Corner? Eight Things We’re Watching ...
Business Law Training: What’s Around the Corner? Eight Things We’re Watching ...Quarles & Brady
 

More from Quarles & Brady (20)

Protecting Designs Without Design Patents
Protecting Designs Without Design PatentsProtecting Designs Without Design Patents
Protecting Designs Without Design Patents
 
2020 Wisconsin Insurance Case Law Year in Review
2020 Wisconsin Insurance Case Law Year in Review2020 Wisconsin Insurance Case Law Year in Review
2020 Wisconsin Insurance Case Law Year in Review
 
Interest Rate Swaps for Borrower’s Counsel
Interest Rate Swaps for Borrower’s CounselInterest Rate Swaps for Borrower’s Counsel
Interest Rate Swaps for Borrower’s Counsel
 
2016 Year in Review: Recent Midwest Legal Decisions Impacting Real Estate and...
2016 Year in Review: Recent Midwest Legal Decisions Impacting Real Estate and...2016 Year in Review: Recent Midwest Legal Decisions Impacting Real Estate and...
2016 Year in Review: Recent Midwest Legal Decisions Impacting Real Estate and...
 
Key Bankruptcy Considerations Heading into a Recession
Key Bankruptcy Considerations Heading into a RecessionKey Bankruptcy Considerations Heading into a Recession
Key Bankruptcy Considerations Heading into a Recession
 
Key Bankruptcy Considerations Heading into a Recession
Key Bankruptcy Considerations Heading into a RecessionKey Bankruptcy Considerations Heading into a Recession
Key Bankruptcy Considerations Heading into a Recession
 
Emerging Trends in Commercial Mortgage Lending During COVID-19
Emerging Trends in Commercial Mortgage Lending During COVID-19Emerging Trends in Commercial Mortgage Lending During COVID-19
Emerging Trends in Commercial Mortgage Lending During COVID-19
 
Action Steps for Your Employee Benefits Plan During the Coronavirus Pandemic
Action Steps for Your Employee Benefits Plan During the Coronavirus PandemicAction Steps for Your Employee Benefits Plan During the Coronavirus Pandemic
Action Steps for Your Employee Benefits Plan During the Coronavirus Pandemic
 
Coronavirus & COVID-19 Update
Coronavirus & COVID-19 UpdateCoronavirus & COVID-19 Update
Coronavirus & COVID-19 Update
 
The Tampa Office Celebrates 10 Years!
The Tampa Office Celebrates 10 Years!The Tampa Office Celebrates 10 Years!
The Tampa Office Celebrates 10 Years!
 
Guidance for Employers During the Evolving COVID-19 Pandemic
Guidance for Employers During the Evolving COVID-19 PandemicGuidance for Employers During the Evolving COVID-19 Pandemic
Guidance for Employers During the Evolving COVID-19 Pandemic
 
Guidance for Employers During the Evolving COVID-19 Pandemic
Guidance for Employers During the Evolving COVID-19 PandemicGuidance for Employers During the Evolving COVID-19 Pandemic
Guidance for Employers During the Evolving COVID-19 Pandemic
 
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
 
A Practical Roadmap For Navigating Medical Staff Legal Nightmares In Current ...
A Practical Roadmap For Navigating Medical Staff Legal Nightmares In Current ...A Practical Roadmap For Navigating Medical Staff Legal Nightmares In Current ...
A Practical Roadmap For Navigating Medical Staff Legal Nightmares In Current ...
 
Medical Staff Structure And Bylaws: Current Trends And Best Practices
Medical Staff Structure And Bylaws: Current Trends And Best PracticesMedical Staff Structure And Bylaws: Current Trends And Best Practices
Medical Staff Structure And Bylaws: Current Trends And Best Practices
 
Current Cases: Medical Staff Nightmares And Fairy Tales
Current Cases: Medical Staff Nightmares And Fairy TalesCurrent Cases: Medical Staff Nightmares And Fairy Tales
Current Cases: Medical Staff Nightmares And Fairy Tales
 
Employment and Telemedicine Arrangements Between Hospitals and Practitioners:...
Employment and Telemedicine Arrangements Between Hospitals and Practitioners:...Employment and Telemedicine Arrangements Between Hospitals and Practitioners:...
Employment and Telemedicine Arrangements Between Hospitals and Practitioners:...
 
Physician Employment and Medical Staff Matters - Fun Times For HR Directors!
Physician Employment and Medical Staff Matters - Fun Times For HR Directors!Physician Employment and Medical Staff Matters - Fun Times For HR Directors!
Physician Employment and Medical Staff Matters - Fun Times For HR Directors!
 
Understand the SECURE Act, the Repeal of the “Cadillac Tax” and Other Health ...
Understand the SECURE Act, the Repeal of the “Cadillac Tax” and Other Health ...Understand the SECURE Act, the Repeal of the “Cadillac Tax” and Other Health ...
Understand the SECURE Act, the Repeal of the “Cadillac Tax” and Other Health ...
 
Business Law Training: What’s Around the Corner? Eight Things We’re Watching ...
Business Law Training: What’s Around the Corner? Eight Things We’re Watching ...Business Law Training: What’s Around the Corner? Eight Things We’re Watching ...
Business Law Training: What’s Around the Corner? Eight Things We’re Watching ...
 

Recently uploaded

如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Oishi8
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 

Recently uploaded (20)

如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 

Legal Risks of Operating in the World of Connected Technologies (Internet of Things)

  • 1. Legal Risks of Operating in the World of Connected Technologies (IoT) Business Law Training April 12, 2018 Linda Emery Heather Buchta
  • 2. -2- What is the Internet of Things?  It's not new – term was first used in the late 90's  "ubiquitous ecosystem of sensors and connected devices"  "cyber physical systems"  "system of systems"  "smart systems that include co-engineered interacting networks of physical and computational components"  "internet-enabled appliances to an existing infrastructure of computers and mobile devices"
  • 3. -3- What is it really?  "interconnection of computing devices embedded in everyday objects via the Internet to send and receive data"  "sprawling set of technologies and use cases that has no clear, single definition"  Device + software + connectivity + big data = IoT
  • 4. -4- What is the Internet of Things?  Over 26 Billion by 2020  Smart Home  Connected Health  Connected Cars  Connected Industrial
  • 5. -5- Five Largest Categories  Connected Vehicles  Connected Health Care Devices  Connected Homes  Industrial internet (transportation, oil & gas, and healthcare)  Vehicles
  • 6. -6- What does it look like?
  • 7. -7- Why the sudden rise? Computing power Bandwidth Cheap data storage
  • 8. -8- Why is it different?  Functionality  It's "smart"  Functions/processes without being told  Communications capability  Creates risk and security vulnerabilities  Intellectual property  Embedded software – copyrights and patents  Laws favor the author/inventor/developer  Who owns data??  Result is complexities in implementation and development
  • 9. -9- Legal Risks Regulatory Data Privacy Data Security Product Liability Industry Self-Regulation
  • 10. -10- What's at Risk  Damage to Reputation & Loss of Goodwill  Investigations and Incident Response  Legal Fees, Notification Costs, Call Centers  Loss of Competitive Advantage  Lost Sales, Revenues & Profits  Lawsuits/Class Actions  Regulatory Fines
  • 12. -12- FTC Recommendations  FTC Recommendations for Data Security and Privacy Practices When Selling Connected Products  https://www.ftc.gov/system/files/documents/reports /federal-trade-commission-staff-report-november- 2013-workshop-entitled-internet-things- privacy/150127iotrpt.pdf
  • 13. -13- IoT is a Team Sport Multidisciplinary Team. The FTC recommends the company’s  Hardware designers and engineers  Software and app developers  IT security personnel  Legal and compliance  HR  Marketing
  • 14. -14- Security By Design  Security By Design. Companies need to include security by design, not as an after thought  Don’t Assume Safety: Product design should not assume safety of a customer’s home network  Testing: Test the security of devices before launching a product
  • 15. -15- Risks During Product Testing  Third Party Products. Check for vulnerabilities in third-party components integrated into your products.  Relock Doors. Verify that if you turn off security measures during testing, you switch them back on before going live.  Back Doors. Check whether you have closed back doors through which hackers could access information or gain control of the device.
  • 16. -16- Multiple Levels of Security Multiple Levels of Security. Companies should identify significant risks within their systems at every level Implementing security measures at several levels Identify security soft spots
  • 17. -17- Data Mapping and Collection  What Data is Collected: Inventory of Information. If a device collects and transmits data, have an up-to- date inventory of the kinds of information in your possession.  Why are you Collecting It?  Where are you storing it?  How are you storing it? – Combinations of PII and Connected Data?  How long are you storing it?
  • 18. -18- Best Practices  An understanding of where your data is held  Clear privacy policy which you follow  Strong IT and product security practices  A data breach plan and team  High engagement by the Company on privacy issues on an enterprise-wide basis
  • 19. -19- Consumer Product Safety Commission (CPSC)  CPSC “impute[s] to the subject firm knowledge of product safety related information received by an official or employee of a subject firm capable of appreciating the significance of the information.”  Does the data collected by connected devices constitute “knowledge of product safety related information?”  If a manufacturer chooses not to analyze information available to it, can it then claim it was not “capable of appreciating the significance” of isolated reports?
  • 20. -20- Homeland Security Report Traditional product liability law can be expected to apply Liability for inadequate attention to security
  • 21. -21- DHS Report  Manufacturers should design with worst-case scenarios in mind. “Developers should build IoT devices to fail safely and securely, so that the failure does not lead to greater systemic disruption.”  IoT devices should be designed so they can be updated if security flaws are found. “In the absence of the ability to deploy security updates, manufacturers may be faced with the decision between costly recalls and leaving devices with known vulnerabilities in circulation.”
  • 22. -22- Medical Devices  By 2020, 40% of IoT-related technology will be health related – more than any other category  Expect uptick in medical device litigation  “Where manufacturers, healthcare providers and consumers see innovation, functionality, integration and an all-around more capable product, plaintiffs’ firms see potential failure on a mass basis and dollar signs.” MEDICAL DEVICE LITIGATION The “Internet of Things” Is Coming: 11 No. 3 In-House Def. Q. 26
  • 23. -23- Food & Drug Administration  Food and Drug Administration issued final guidance regarding the need for post-market management of cybersecurity in medical devices  https://www.fda.gov/downloads/MedicalDevices/Dev iceRegulationandGuidance/GuidanceDocuments/UC M482022.pdf
  • 24. -24- Food & Drug Administration  January 2016, the FDA released draft guidance for post-market management of cybersecurity in medical devices.  Developer to address cybersecurity throughout the product life cycle, including the design, development, production, distribution, deployment, and maintenance.  Cybersecurity risks to medical devices are evolving and therefore it is not possible to completely mitigate risks through premarket controls alone.
  • 25. -25- National Highway Traffic Safety Administration Federal Automated Vehicles Policy https://www.nhtsa.gov/sites/nhtsa.dot.gov/files/federal_automated_vehicles_policy.pdf Federal Motor Vehicle Safety Standards for Automated Vehicles
  • 26. -26- Autonomous Vehicle Laws  Some states have specific laws covering autonomous vehicles: District of Columbia, California, Florida, Michigan, Nevada, North Dakota and Tennessee.
  • 27. -27- NIST Guidelines  Require compliance with NIST Guidelines https://www.nist.gov/cyberframework  Framework for Improving Critical Infrastructure Cybersecurity, National Institute of Standards and Technology, February 12, 2014 (Version 1.0)  Currently on draft version 2 of Version 1.1
  • 28. -28- Underwriters Laboratory  UL 2900 - Cybersecurity Assurance Program (CAP) UL 2900 is not a standard. It is an outline for the eventual development of a standard.  Requirements regarding the vendor’s risk management process for its product.  Designed to help vendors minimize cybersecurity risks by assessing software vulnerabilities, minimize exploitation, address known malware, review security controls, and increase security awareness.
  • 30. -30- Software and Sensors Software and sensors are critical component parts suppliers in IoT They are both “component parts suppliers” Significant product liability exposure
  • 31. -31- IoT Product Claims Was the misuse, modification or manipulation foreseeable? Who is at fault?: The hacker, the manufacturer, the software provider, the sensor manufacturer or the owner who failed to properly secure the product?
  • 32. -32- 3 Product Liability Issues With IoT Product failure Security breach Data destruction, manipulation, or alteration
  • 33. -33- Risk 1: Product Failure  Product malfunction which causes personal injury or property damage  Nest: Nest thermostat suffered a software malfunction, drained the battery and shut down the Nest device  Harm: Cold homes, water pipe damage, and concerns about infants exposed to cold temperatures  Lawsuit: Although Nest fixed the problem, a law firm is looking for plaintiffs for personal injury or property damage lawsuits
  • 34. -34- Risk 2: Security Breach  Claims of physical injury caused by a hack or other security breach  Jeep: White Hat Hackers remotely accessed a Jeep’s controls through the vehicle’s communications system  Result: Chrysler recalled 1.4 million vehicles in 2015  Legal: Subject of a government investigation
  • 35. -35- Risk 3: Data Alteration  An IoT product/server is hacked and personal data downloaded and used by hacker  California Hospital: suffered a Denial of Service Attack in 2016. Hackers held the hospital’s IT system hostage for 10 days  Result: Hospital paid hackers 17,000 bitcoin for encryption key  Legal Risk: Critical patient care services would be compromised. Medical records could have been altered and devices, such as infusion pumps for chemotherapy, would become vulnerable to dosage manipulations.
  • 36. -36- Who is Liable for IoT Losses? Software developer Sensor manufacturer Manufacturer Retailer Consumer
  • 37. -37- Who Is At Fault?  Artificial Intelligence: Computer algorithms decide vehicle actions  Auto-crash cases: Move from human negligence to product-liability claims  When manufacturers’ algorithms – created months and years in advance – can make driving decisions that may have life and death implications.
  • 38. -38- Open Issues  Harder to investigate  More difficult to prove liability  New types of experts to investigate?  Products themselves will give much more information
  • 39. -39- Discovery and Experts Software issues make discovery more complicated Need for experts regarding both software and hardware
  • 40. -40- Software Developers Software developer for an IoT product is likely vulnerable to claims Developers are used to speed to market as the benchmark Solution: Privacy (and safety) by design
  • 41. -41- Software Vendors  Software licensors will not be protected against third- party injury claims  Many software vendors:  don’t understand their product liability exposure to claims for bodily injury and property damage caused by third parties; or  have failed to provide for such exposures in their agreements  Software vendors won’t be protected merely by contracts with the manufacturers of the end products
  • 42. -42- Consumer Responsibility What if the consumer fails to update their software or a password? What if the customer downloads malware?
  • 43. -43- Failure to Warn Liability may exist if a manufacturer of a product knew or should have known of a potential danger and failed to give adequate directions or warnings of a potential danger Connected devices may provide manufacturers more metrics and information about their connected devices and the manner in which they are being used
  • 44. -44- Big Data Risk We are retaining massive volumes of data Retained information may impact the manufacturer’s duty to warn When manufacturing and marketing new products, companies need to determine what information is important to retain
  • 45. -45- IoT Litigation IoT lawsuits are “on the rise” Most cases are still “unresolved or have been dismissed because courts couldn’t find injury”
  • 46. -46- Cahen v. Toyota Motor Corp.  In Cahen v. Toyota Motor Corp., 3:15-cv-01104 (N.D. Cal. March 10, 2015), Plaintiffs alleged auto manufacturers equipped their vehicles with computer technology that is vulnerable to hacking  Hackers can communicate remotely with the computers controlling vehicle functions, resulting in a complete loss of driver control over steering, accelerating and braking  Plaintiffs alleged manufacturers were aware of security vulnerabilities, but represented the products as safe
  • 47. -47- IoT Lawsuits – Auto (continued)  Defendants argued “that plaintiffs do not allege any hacking incidents that have taken place outside of controlled settings, and that the entire threat rests on the speculative premise that a sophisticated third party cybercriminal may one day successfully hack one of plaintiffs’ vehicles.”  The court agreed, citing potential risk of future hacking was not an injury in fact. Plaintiffs have appealed the dismissal to the Ninth Circuit.
  • 48. -48- Flynn vs. FCA  Chrysler Group. In Flynn v. FCA US LLC., 3:15-cv-855  (S.D. Ill. Aug. 4, 2015):  Plaintiffs alleged security flaw in “infotainment” centers manufactured by Harman International Industries for certain Chrysler vehicles.  Plaintiffs alleged infotainment system “exceedingly hackable,” permits hackers to “remotely take control” of steering, acceleration and braking, and lacks the ability quickly and effectively for software security flaws to be “patched.”  Court held plaintiffs had standing to sue for damages for diminished value of car because “the ongoing vulnerabilities have reduced the market value of their vehicles.”  2015 article in Wired drew attention to vulnerability on sales price.
  • 49. -49- Home Security Devices  Baker v. ADT Corp., No. 2:15-cv-02038 (C.D. Ill. Nov. 9, 2014). Plaintiff filed class action alleging ADT’s wireless security and monitoring equipment could be remotely turned on or off using technology readily available to the public.  Plaintiff alleged his system was hacked at least twice by an unauthorized third party, which “caused the system to be falsely triggered, which in turn caused ADT to contact Plaintiff and have the police called to Plaintiff’s home.”
  • 50. -50- Medical Devices  Ross v. St. Jude Medical Inc., No. 2:16-cv-06465 (C.D. Cal. Aug. 26, 2016):  Plaintiff challenges a variety of St. Jude Medical’s implants — including pacemakers, defibrillators and heart resynchronizers — that use radiofrequency wireless technology.  Plaintiff claims that the devices are exposed to potential attacks in which hackers could disable the device or drain its battery.
  • 51. -51- Medical Devices (continued)  The technology allows the implanted devices to be monitored remotely. The plaintiff alleged that the company owed the patients a “duty of care to ensure that the devices safeguarded against potential hacking...”  “It is foreseeable that if defendants did not take reasonable security measures, the devices could be accessed, viewed or controlled by unauthorized persons.”  Plaintiff voluntarily dismissed the case, without prejudice, in December 2016.
  • 53. -53- Culture of Security Senior Management Employee Training
  • 54. -54- Contracts and Internal Policies  Contractual protections between manufacturers and software developers to properly balance and shift the potential third-party liability exposures  Disclaimers of liability by consumers?  Privacy Policies and Just in Time Privacy Notices  Incident Response Plans
  • 55. -55- Prior to Development What type of development is taking place?  Hiring a contractor to develop  Being hired as a contractor to develop  Jointly developing Confidentiality is not the same as ownership  Development brings risk that is not addressed in NDAs  Ownership and assignments need to be particularly spelled out, along with risk
  • 56. -56- Development Considerations Data Privacy  Privacy by Design  Data "ownership"  Data use  Who has the data privacy obligations?  Collectors  Processors
  • 57. -57- Development Legal Risks Product Liability  Product Failure  Software Developer  Sensor Manufacturer  Manufacturer  Retailer  Consumer  Data Security  Breach  Data Integrity
  • 58. -58- Document Lifecycle of an IoT Development  NDA  LOI/MOU – only if serves a business purpose  Usually nonbinding  Development Agreement – who is hiring who?  Contributions  Ownership  Clearance  Delivery obligations – fees, timelines, expenses, specs  Liability  Support/maintenance – only maybe  End result is usually a working prototype
  • 59. -59- Document Lifecycle of an IoT Development (cont'd)  Commercialization Agreement  Production/distribution  Marketing/sales  Hosting  Data collection/use/ownership  Support/maintenance  End Users  Terms and conditions  End user license agreements  Privacy policies
  • 60. -60- Development Considerations Ownership and Clearance  Open Source/Third Party Code  Risk of Infringement In-Market Complexities  Ongoing Support  Ongoing Maintenance  Subsequent Owners
  • 61. -61- Laws and Standards Bodies Laws and regulations Standards organizations Industry groups
  • 63. -63- Security Protections Warnings Notices of security patches and updates Strict password requirements Disclaim liability for user negligence
  • 64. -64- Lifecycle Limited access to devices Monitor products through lifecycle and apply patches
  • 66. Questions? Linda Emery Heather Buchta 414-277-3038 602-229-5228 linda.emery@quarles.com heather.buchta@quarles.com © 2018 Quarles& Brady LLP - This document provides information of a general nature. None of the information contained herein is intended as legal advice or opinion relative to specific matters, facts, situations or issues. Additional facts and information or future developments may affect the subjects addressed in this document. You should consult with a lawyer about your particular circumstances before acting on any of this information because it may not be applicable to you or your situation.