SlideShare a Scribd company logo
How Digital Technology is Shaping
the Future of Humanity
An American Legal Perspective
MARTHA BUYER
MARCH 1, 2017
LAW OFFICES OF MARTHA BUYER, PLLC
WWW.MARTHABUYER.COM
1
2
4
Incredible convenience and efficiencies
create incredible vulnerabilities
 Would you want your emails read?
 What steps do you take to keep your private
information private?
5
Who is responsible? 6
Another (very!) Important Consideration
technical expertise
security expertise
7
In the U.S., 4 critical entities
 NTIA – U. S. Department of Commerce
 FTC – Federal Trade Commission
 FCC – Federal Communications Commission
 States
8
9
Viviana Gonzalez AGATE
10
NTIA – U.S. Department of Commerce
 Not a regulator
 Multiple stakeholders process
 Continuing open standards process
 To continue to be a strong and active user of devices
to learn from the staff’s own experiences
11
Federal Trade Commission
 An enforcement agency
12
FTC (con’t)
 Same basic principles of software security apply to
IoT
 Making sure that the right people are in charge and
actively managing security issues
 Having a written plan in place
13
FTC (enforcement focus)
 Conducting risk assessments and addressing the
identified risks
 Oversight of service providers
A continuous process
 The “reasonableness” in enforcement, not strict
liability
14
Quantifiable Harm
 FTC’s pursuit of “deception” will continue
 Industry-specific statutes will continue to be used in
enforcement
 FTC will be looking at harm.
When there’s a failure of an IoT device, there can
be numerous harms
15
FCC 16
FCC
 FCC’s privacy rules, which are scheduled to take effect this
Thursday, require broadband providers (ISPs) to keep
customer information confidential.
 FCC’s vote gave consumers control, with mandated disclosure
and opt-in requirements for sensitive data, as well as data
security protections, he added.
17
State Law 18
Managing Increased Connectivity
A Legal Perspective
IoT has many new players who haven’t had to
consider security in the same way that other
information technology providers have.
19
3 key challenges to managing IoT
devices
 1. Ubiquitous data collection
 2. Unexpected uses of consumer data
 3. Heightened security risk, as devices can be easily
compromised.
20
Two categories of devices
 Those with privacy implications
 Those without privacy implications
21
IoT Device Management
 Current operation
 Ongoing maintenance and support
 Knowledge about how IoT-generated
information is being shared, and with whom
22
One more thing…
 Sometimes the information that’s being collected
becomes its own product with its own generated
income stream.
 Whose information is it?
 Who is benefiting from its sale?
23
Whose Responsibility is it?
 Manufacturer
 Seller/Distributor
 Consumer
 Software patches
 Security updates
 Ongoing maintenance
 Knowledge of product life cycle
24
IoT = Increased Vulnerability 25
Every lawyer’s favorite question…
Where is the risk?
Risk in communications to and from
IoT device(s)
Risk to the integrity of the device
itself.
26
IoT Trivia
 Large number of IoT devices with factory default
passwords that have never been changed
 Personal devices
 Industrial devices with broad reach
27
Cybersecurity Considerations
1. “Mature” manufacturers of newly connected
devices may have little, if any experience in
managing the collection, security and protection
of consumer data
28
Cybersecurity Considerations (con’t)
2. Challenge of the manufacturer and
distributor of getting the product to
market v. getting the product to market
safely
29
Cybersecurity Considerations (con’t)
3. Threats and vulnerabilities are constantly
evolving. Best practices must continue to evolve
too!
30
Cybersecurity Considerations (the last
one)
4. There is no one single best
solution
31
OK…one more consideration
Security failures are more likely to occur
when security is not a consideration
throughout the concept and design
processes
32
Data Minimization
 The collection and retention of large amounts of data
increases the harms associated with a breach
Larger stores of data are more valuable to hackers
than are small ones
33
 If the company collects and retains large
amounts of data, there is a risk that the data
will be used in a way that departs from
consumers’ reasonable expectations of how
that data will be used
34
Pre-IoT Purchase Questions
1. Does the hardware contain built-in safeguards?
a. What authentication tools exist?
2. Is a complete testing protocol in place?
a. The keyword here is “complete.”
3. How can security practices be communicated to customers, relevant regulators
and the public?
4. How often will the system be upgraded or patched? Is there a regular schedule
35
Regulation
Industry should regulate itself
Regulation stifles innovation
Industry is too young to be regulated
(yet)
Industry cannot regulate itself
36
Key Regulatory Considerations
 Privacy
 Security
 Transparency
Notice
Consent
 Intellectual Property
37
Who Will Regulate? 38
Questions?
39
Thank you!
40

More Related Content

What's hot

Towards Security Software Engineering the Smart Grid as a System of Systems
Towards Security Software Engineering the Smart Grid as a System of SystemsTowards Security Software Engineering the Smart Grid as a System of Systems
Towards Security Software Engineering the Smart Grid as a System of Systems
Vanea Chiprianov
 
Security in Mobile Computing
Security in Mobile ComputingSecurity in Mobile Computing
Security in Mobile Computing
MeghaSingla7
 
UK Conference 2018_Software support and maintenance survey - Martin Thompson
UK Conference 2018_Software support and maintenance survey - Martin ThompsonUK Conference 2018_Software support and maintenance survey - Martin Thompson
UK Conference 2018_Software support and maintenance survey - Martin Thompson
Victoria Kealy
 
Critical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet BankingCritical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet BankingThomas Donofrio
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
Cyril Soeri
 
IoT Policy and Regulatory Framework
IoT Policy and Regulatory FrameworkIoT Policy and Regulatory Framework
IoT Policy and Regulatory Framework
Gwanhoo Lee
 
Access control systems
Access control systemsAccess control systems
Access control systems
arnoldpeter01
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?
IndSightsResearchSG
 
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna Leonardo
 
Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)
Eryk Budi Pratama
 
Access Control Systems
Access Control SystemsAccess Control Systems
Access Control Systems
arnoldpeter01
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docx
Amir Khan
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
Industrial Internet Consortium
 
Intrusion detection and prevention systems market is expected to grow $7.1 bi...
Intrusion detection and prevention systems market is expected to grow $7.1 bi...Intrusion detection and prevention systems market is expected to grow $7.1 bi...
Intrusion detection and prevention systems market is expected to grow $7.1 bi...
DheerajPawar4
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
Business Finland
 
Sharing best practices for success
Sharing best practices for successSharing best practices for success
Sharing best practices for success
Secure Identity Alliance
 
Management Structures for IT Security
Management Structures for IT SecurityManagement Structures for IT Security
Management Structures for IT Security
zohraz
 
Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...
Secure Identity Alliance
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati
 

What's hot (20)

Towards Security Software Engineering the Smart Grid as a System of Systems
Towards Security Software Engineering the Smart Grid as a System of SystemsTowards Security Software Engineering the Smart Grid as a System of Systems
Towards Security Software Engineering the Smart Grid as a System of Systems
 
IoT PPT Deck
IoT PPT DeckIoT PPT Deck
IoT PPT Deck
 
Security in Mobile Computing
Security in Mobile ComputingSecurity in Mobile Computing
Security in Mobile Computing
 
UK Conference 2018_Software support and maintenance survey - Martin Thompson
UK Conference 2018_Software support and maintenance survey - Martin ThompsonUK Conference 2018_Software support and maintenance survey - Martin Thompson
UK Conference 2018_Software support and maintenance survey - Martin Thompson
 
Critical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet BankingCritical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet Banking
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
IoT Policy and Regulatory Framework
IoT Policy and Regulatory FrameworkIoT Policy and Regulatory Framework
IoT Policy and Regulatory Framework
 
Access control systems
Access control systemsAccess control systems
Access control systems
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?
 
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
 
Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)
 
Access Control Systems
Access Control SystemsAccess Control Systems
Access Control Systems
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docx
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
Intrusion detection and prevention systems market is expected to grow $7.1 bi...
Intrusion detection and prevention systems market is expected to grow $7.1 bi...Intrusion detection and prevention systems market is expected to grow $7.1 bi...
Intrusion detection and prevention systems market is expected to grow $7.1 bi...
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
Sharing best practices for success
Sharing best practices for successSharing best practices for success
Sharing best practices for success
 
Management Structures for IT Security
Management Structures for IT SecurityManagement Structures for IT Security
Management Structures for IT Security
 
Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 

Similar to An American Legal Perspective

ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
yashapnt
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
Ulf Mattsson
 
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Quarles & Brady
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual
William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
William Tanenbaum
 
FTC Internet of Things Article
FTC Internet of Things ArticleFTC Internet of Things Article
FTC Internet of Things ArticleKimberly Verska
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
William Tanenbaum
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)Adam Thierer
 
Wm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business Cases
William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
William Tanenbaum
 
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
William Tanenbaum
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual
William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
William Tanenbaum
 
150127iotrpt
150127iotrpt150127iotrpt
150127iotrpt
Andrey Apuhtin
 
150127iotrpt
150127iotrpt150127iotrpt
150127iotrpt
madhu ck
 
Iot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrptIot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrpt
Market Engel SAS
 
FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)
Dr Dev Kambhampati
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
Precisely
 
Anti Counterfeiting - Playing Roulette Or Chess?
Anti Counterfeiting - Playing Roulette Or Chess?Anti Counterfeiting - Playing Roulette Or Chess?
Anti Counterfeiting - Playing Roulette Or Chess?
Ruth Thomson
 

Similar to An American Legal Perspective (20)

ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
FTC Internet of Things Article
FTC Internet of Things ArticleFTC Internet of Things Article
FTC Internet of Things Article
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
 
Wm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business Cases
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
150127iotrpt
150127iotrpt150127iotrpt
150127iotrpt
 
150127iotrpt
150127iotrpt150127iotrpt
150127iotrpt
 
Iot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrptIot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrpt
 
FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
Anti Counterfeiting - Playing Roulette Or Chess?
Anti Counterfeiting - Playing Roulette Or Chess?Anti Counterfeiting - Playing Roulette Or Chess?
Anti Counterfeiting - Playing Roulette Or Chess?
 

More from Agustin Argelich Casals

AIRESS Resucitator: Emergency Ventilator
AIRESS Resucitator: Emergency VentilatorAIRESS Resucitator: Emergency Ventilator
AIRESS Resucitator: Emergency Ventilator
Agustin Argelich Casals
 
Energy Transformation for a Greener Future
Energy Transformation for a Greener FutureEnergy Transformation for a Greener Future
Energy Transformation for a Greener Future
Agustin Argelich Casals
 
Observations of Telecom over the last 40 years
Observations of Telecom over the last 40 yearsObservations of Telecom over the last 40 years
Observations of Telecom over the last 40 years
Agustin Argelich Casals
 
Healthcare digital transformation - How to lead it COMB def.pdf
Healthcare digital transformation - How to lead it COMB def.pdfHealthcare digital transformation - How to lead it COMB def.pdf
Healthcare digital transformation - How to lead it COMB def.pdf
Agustin Argelich Casals
 
The 5+1 indicators of the Intelligent Community Forum methodology
The 5+1 indicators of the Intelligent Community Forum methodologyThe 5+1 indicators of the Intelligent Community Forum methodology
The 5+1 indicators of the Intelligent Community Forum methodology
Agustin Argelich Casals
 
Agustin Argelich - 5 key factors to lead innovation.pdf
Agustin Argelich - 5 key factors to lead innovation.pdfAgustin Argelich - 5 key factors to lead innovation.pdf
Agustin Argelich - 5 key factors to lead innovation.pdf
Agustin Argelich Casals
 
Digital transformation: what does it mean for Vietnam, and how to lead it to ...
Digital transformation: what does it mean for Vietnam, and how to lead it to ...Digital transformation: what does it mean for Vietnam, and how to lead it to ...
Digital transformation: what does it mean for Vietnam, and how to lead it to ...
Agustin Argelich Casals
 
A networked World. The power of collaboration
A networked World.  The power of collaborationA networked World.  The power of collaboration
A networked World. The power of collaboration
Agustin Argelich Casals
 
The power of Collaboration in the Digital era
The power of Collaboration in the Digital eraThe power of Collaboration in the Digital era
The power of Collaboration in the Digital era
Agustin Argelich Casals
 
The new role of Governments in deregulated telecom markets. Who is responsibl...
The new role of Governments in deregulated telecom markets. Who is responsibl...The new role of Governments in deregulated telecom markets. Who is responsibl...
The new role of Governments in deregulated telecom markets. Who is responsibl...
Agustin Argelich Casals
 
How digital technology is shaping the future of humanity
How digital technology is shaping the future of humanityHow digital technology is shaping the future of humanity
How digital technology is shaping the future of humanity
Agustin Argelich Casals
 
US Enterprise Cellular Market Competing Against "Big Four"
US Enterprise Cellular Market Competing Against "Big Four"US Enterprise Cellular Market Competing Against "Big Four"
US Enterprise Cellular Market Competing Against "Big Four"
Agustin Argelich Casals
 
UETS – Universal Ethernet Telecommunications Services
UETS – Universal Ethernet Telecommunications ServicesUETS – Universal Ethernet Telecommunications Services
UETS – Universal Ethernet Telecommunications Services
Agustin Argelich Casals
 
Dave Mailer presentation at VI Telecom consultants day
Dave Mailer presentation at VI Telecom consultants dayDave Mailer presentation at VI Telecom consultants day
Dave Mailer presentation at VI Telecom consultants day
Agustin Argelich Casals
 
Communications Technology where we are? where are we going?
Communications Technology where we are? where are we  going?Communications Technology where we are? where are we  going?
Communications Technology where we are? where are we going?
Agustin Argelich Casals
 
Tackling Crisis and Disparity - Integral to Economic Progress
Tackling Crisis and Disparity - Integral to Economic ProgressTackling Crisis and Disparity - Integral to Economic Progress
Tackling Crisis and Disparity - Integral to Economic Progress
Agustin Argelich Casals
 
AIRESS investment opportunity - executive summary -eg-01
AIRESS investment opportunity - executive summary -eg-01AIRESS investment opportunity - executive summary -eg-01
AIRESS investment opportunity - executive summary -eg-01
Agustin Argelich Casals
 
AIRESS - Emergency Ventilator
AIRESS - Emergency VentilatorAIRESS - Emergency Ventilator
AIRESS - Emergency Ventilator
Agustin Argelich Casals
 
Como gestionar una pandemia sin confinar a todo el pais.
Como gestionar una pandemia sin confinar a todo el pais.Como gestionar una pandemia sin confinar a todo el pais.
Como gestionar una pandemia sin confinar a todo el pais.
Agustin Argelich Casals
 
Hospital's Digital Transformation How to lead it?
Hospital's Digital Transformation How to lead it?Hospital's Digital Transformation How to lead it?
Hospital's Digital Transformation How to lead it?
Agustin Argelich Casals
 

More from Agustin Argelich Casals (20)

AIRESS Resucitator: Emergency Ventilator
AIRESS Resucitator: Emergency VentilatorAIRESS Resucitator: Emergency Ventilator
AIRESS Resucitator: Emergency Ventilator
 
Energy Transformation for a Greener Future
Energy Transformation for a Greener FutureEnergy Transformation for a Greener Future
Energy Transformation for a Greener Future
 
Observations of Telecom over the last 40 years
Observations of Telecom over the last 40 yearsObservations of Telecom over the last 40 years
Observations of Telecom over the last 40 years
 
Healthcare digital transformation - How to lead it COMB def.pdf
Healthcare digital transformation - How to lead it COMB def.pdfHealthcare digital transformation - How to lead it COMB def.pdf
Healthcare digital transformation - How to lead it COMB def.pdf
 
The 5+1 indicators of the Intelligent Community Forum methodology
The 5+1 indicators of the Intelligent Community Forum methodologyThe 5+1 indicators of the Intelligent Community Forum methodology
The 5+1 indicators of the Intelligent Community Forum methodology
 
Agustin Argelich - 5 key factors to lead innovation.pdf
Agustin Argelich - 5 key factors to lead innovation.pdfAgustin Argelich - 5 key factors to lead innovation.pdf
Agustin Argelich - 5 key factors to lead innovation.pdf
 
Digital transformation: what does it mean for Vietnam, and how to lead it to ...
Digital transformation: what does it mean for Vietnam, and how to lead it to ...Digital transformation: what does it mean for Vietnam, and how to lead it to ...
Digital transformation: what does it mean for Vietnam, and how to lead it to ...
 
A networked World. The power of collaboration
A networked World.  The power of collaborationA networked World.  The power of collaboration
A networked World. The power of collaboration
 
The power of Collaboration in the Digital era
The power of Collaboration in the Digital eraThe power of Collaboration in the Digital era
The power of Collaboration in the Digital era
 
The new role of Governments in deregulated telecom markets. Who is responsibl...
The new role of Governments in deregulated telecom markets. Who is responsibl...The new role of Governments in deregulated telecom markets. Who is responsibl...
The new role of Governments in deregulated telecom markets. Who is responsibl...
 
How digital technology is shaping the future of humanity
How digital technology is shaping the future of humanityHow digital technology is shaping the future of humanity
How digital technology is shaping the future of humanity
 
US Enterprise Cellular Market Competing Against "Big Four"
US Enterprise Cellular Market Competing Against "Big Four"US Enterprise Cellular Market Competing Against "Big Four"
US Enterprise Cellular Market Competing Against "Big Four"
 
UETS – Universal Ethernet Telecommunications Services
UETS – Universal Ethernet Telecommunications ServicesUETS – Universal Ethernet Telecommunications Services
UETS – Universal Ethernet Telecommunications Services
 
Dave Mailer presentation at VI Telecom consultants day
Dave Mailer presentation at VI Telecom consultants dayDave Mailer presentation at VI Telecom consultants day
Dave Mailer presentation at VI Telecom consultants day
 
Communications Technology where we are? where are we going?
Communications Technology where we are? where are we  going?Communications Technology where we are? where are we  going?
Communications Technology where we are? where are we going?
 
Tackling Crisis and Disparity - Integral to Economic Progress
Tackling Crisis and Disparity - Integral to Economic ProgressTackling Crisis and Disparity - Integral to Economic Progress
Tackling Crisis and Disparity - Integral to Economic Progress
 
AIRESS investment opportunity - executive summary -eg-01
AIRESS investment opportunity - executive summary -eg-01AIRESS investment opportunity - executive summary -eg-01
AIRESS investment opportunity - executive summary -eg-01
 
AIRESS - Emergency Ventilator
AIRESS - Emergency VentilatorAIRESS - Emergency Ventilator
AIRESS - Emergency Ventilator
 
Como gestionar una pandemia sin confinar a todo el pais.
Como gestionar una pandemia sin confinar a todo el pais.Como gestionar una pandemia sin confinar a todo el pais.
Como gestionar una pandemia sin confinar a todo el pais.
 
Hospital's Digital Transformation How to lead it?
Hospital's Digital Transformation How to lead it?Hospital's Digital Transformation How to lead it?
Hospital's Digital Transformation How to lead it?
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

An American Legal Perspective

  • 1. How Digital Technology is Shaping the Future of Humanity An American Legal Perspective MARTHA BUYER MARCH 1, 2017 LAW OFFICES OF MARTHA BUYER, PLLC WWW.MARTHABUYER.COM 1
  • 2. 2
  • 3.
  • 4. 4
  • 5. Incredible convenience and efficiencies create incredible vulnerabilities  Would you want your emails read?  What steps do you take to keep your private information private? 5
  • 7. Another (very!) Important Consideration technical expertise security expertise 7
  • 8. In the U.S., 4 critical entities  NTIA – U. S. Department of Commerce  FTC – Federal Trade Commission  FCC – Federal Communications Commission  States 8
  • 9. 9
  • 11. NTIA – U.S. Department of Commerce  Not a regulator  Multiple stakeholders process  Continuing open standards process  To continue to be a strong and active user of devices to learn from the staff’s own experiences 11
  • 12. Federal Trade Commission  An enforcement agency 12
  • 13. FTC (con’t)  Same basic principles of software security apply to IoT  Making sure that the right people are in charge and actively managing security issues  Having a written plan in place 13
  • 14. FTC (enforcement focus)  Conducting risk assessments and addressing the identified risks  Oversight of service providers A continuous process  The “reasonableness” in enforcement, not strict liability 14
  • 15. Quantifiable Harm  FTC’s pursuit of “deception” will continue  Industry-specific statutes will continue to be used in enforcement  FTC will be looking at harm. When there’s a failure of an IoT device, there can be numerous harms 15
  • 17. FCC  FCC’s privacy rules, which are scheduled to take effect this Thursday, require broadband providers (ISPs) to keep customer information confidential.  FCC’s vote gave consumers control, with mandated disclosure and opt-in requirements for sensitive data, as well as data security protections, he added. 17
  • 19. Managing Increased Connectivity A Legal Perspective IoT has many new players who haven’t had to consider security in the same way that other information technology providers have. 19
  • 20. 3 key challenges to managing IoT devices  1. Ubiquitous data collection  2. Unexpected uses of consumer data  3. Heightened security risk, as devices can be easily compromised. 20
  • 21. Two categories of devices  Those with privacy implications  Those without privacy implications 21
  • 22. IoT Device Management  Current operation  Ongoing maintenance and support  Knowledge about how IoT-generated information is being shared, and with whom 22
  • 23. One more thing…  Sometimes the information that’s being collected becomes its own product with its own generated income stream.  Whose information is it?  Who is benefiting from its sale? 23
  • 24. Whose Responsibility is it?  Manufacturer  Seller/Distributor  Consumer  Software patches  Security updates  Ongoing maintenance  Knowledge of product life cycle 24
  • 25. IoT = Increased Vulnerability 25
  • 26. Every lawyer’s favorite question… Where is the risk? Risk in communications to and from IoT device(s) Risk to the integrity of the device itself. 26
  • 27. IoT Trivia  Large number of IoT devices with factory default passwords that have never been changed  Personal devices  Industrial devices with broad reach 27
  • 28. Cybersecurity Considerations 1. “Mature” manufacturers of newly connected devices may have little, if any experience in managing the collection, security and protection of consumer data 28
  • 29. Cybersecurity Considerations (con’t) 2. Challenge of the manufacturer and distributor of getting the product to market v. getting the product to market safely 29
  • 30. Cybersecurity Considerations (con’t) 3. Threats and vulnerabilities are constantly evolving. Best practices must continue to evolve too! 30
  • 31. Cybersecurity Considerations (the last one) 4. There is no one single best solution 31
  • 32. OK…one more consideration Security failures are more likely to occur when security is not a consideration throughout the concept and design processes 32
  • 33. Data Minimization  The collection and retention of large amounts of data increases the harms associated with a breach Larger stores of data are more valuable to hackers than are small ones 33
  • 34.  If the company collects and retains large amounts of data, there is a risk that the data will be used in a way that departs from consumers’ reasonable expectations of how that data will be used 34
  • 35. Pre-IoT Purchase Questions 1. Does the hardware contain built-in safeguards? a. What authentication tools exist? 2. Is a complete testing protocol in place? a. The keyword here is “complete.” 3. How can security practices be communicated to customers, relevant regulators and the public? 4. How often will the system be upgraded or patched? Is there a regular schedule 35
  • 36. Regulation Industry should regulate itself Regulation stifles innovation Industry is too young to be regulated (yet) Industry cannot regulate itself 36
  • 37. Key Regulatory Considerations  Privacy  Security  Transparency Notice Consent  Intellectual Property 37