SlideShare a Scribd company logo
Regulation and the
Internet of Things
15th Global Symposium for
Regulators (GSR15)
Prof. Ian Brown
The views expressed in this presentation are those of the author and do not necessarily reflect the opinions of the ITU or its Membership.
DEFINITIONS
• ITU-T: “A global infrastructure for the information society,
enabling advanced services by interconnecting (physical and
virtual) things based on existing and evolving interoperable
information and communication technologies.”
• Concretely: remotely linked tags, sensors and actuators,
increasingly being built into objects throughout the physical
world, driven by ongoing rapid falls in the cost of microchips,
sensors and communications capacity.
• Protocols: NFC, RFID, medical implants, M2M dedicated
networks, ZigBee, Bluetooth, 2G/3G/4G, Wi-Fi, ITS
• Expectations that tens of billions of IoT devices deployed in next
decade, driving economic value in $trillions
POPULAR APPLICATIONS
Individual Society
GPS, Fitbits
Visa PayWave
Mastercard Paypass
Employee passes
Individual
person
Immediate friends/ family;
banks; employers
Mobile money
Fitness data, GPS
location-based data
Egs.
Smart Cities
Smart Grids
Community
IoT
Data
Intended
Audience
Smartphones
Wearables
Connected Cars
Health devices
Smart homes
GP, health authorities;
health & car insurance; Police
Wider friends, social networks
Authorities/regulators
Utility companies;
Other citizens
Smart metering;
Smart water meters
Traffic monitoring
Electricity/water
consumption & billing;
Traffic flow data
Intelligent Transport Systems Event
Data Recorders (EDRs)
Blood pressure monitors;
remote burglar/heating systems
Speed, distance, airbag, crash
locations/alerts;
Heart rate, blood pressure,
Diet; remote heating data
Level
DIVERSITY OF IOT APPLICATIONS
REGULATORY ISSUES
• Licensing and spectrum management
• Switching and roaming
• Addressing and numbering
• Competition
• Security and privacy
LICENSING AND SPECTRUM MANAGEMENT
Goal: Ensure spectrum is available for a wide range of IoT
applications, at short and long range, in licensed and unlicensed
bands.
Best practice: Monitor availability of spectrum for short and long-
range IoT communications and backhaul network capacity.
Encourage 4G deployment and use of small-cell technology.
Potential measures: Further experimentation with use of white
space and shared-space technology.
Encourage development of LTE-A and 5G networks, and keep need
for IoT-specific spectrum under review.
Source: ITU.
SWITCHING AND ROAMING
Goal: Encourage development of SIMs and mobile network
accounts suitable for large M2M users, roaming mobile devices, and
fixed devices in areas of poor reception.
Best practice: Mobile network operators develop M2M-specific
business units with appropriate billing and management.
Further development and deployment of embedded, remotely
provisioned SIMs in M2M systems.
Potential measures: Global agreement on updated E.212 standards,
making appropriate use of GSMA standards.
Provision of Mobile Network Codes to IoT service providers.
ADDRESSING AND NUMBERING
Goal: Large address space needed for globally addressable things
(although many IoT devices only need local connectivity).
Best practice: Deployment of IPv6 by ISPs, public and private sector
organisations.
Use of IMSI for M2M applications.
Potential measures: Universal IPv6 adoption by governments in
their own services and procurements, and other incentives for
private sector adoption.
COMPETITION
Goal: Avoid IoT user lock-in and new barriers to entry.
Best practice: Ensure competition regulators have capability to
monitor IoT markets for abuses of dominant positions.
Provide institutional mechanism for ongoing review of laws and
regulations for impact on IoT competitiveness.
Potential measures: Consider measures to increase interoperability
through competition and consumer law.
Give users a right to easy access to raw data.
Support global standardisation and deployment of remotely
provisioned SIMs for greater M2M competition.
SECURITY AND PRIVACY
Goal: Significantly reduce security vulnerabilities in IoT systems, which let attackers
access private data and cause physical harm in cases such as medical devices and
connected vehicles.
• Encourage security and vulnerability patching of devices.
• Smart city vulnerabilities can be hard to fix due to legacy systems, but present
significant safety issues (e.g. in traffic lights).
Ensure individual control of profiles, which can be used to infer sensitive personal
information, such as medical disorders.
Reduce potential for discrimination in employment, financial and healthcare services.
Best practice: Ensuring security and privacy from outset of IoT system design process.
Development of co-regulation by all stakeholders to protect security and privacy.
Further development of privacy and consumer protection rules to ensure security
testing of IoT systems that process sensitive personal data.
SECURITY AND PRIVACY - POTENTIAL MEASURES
• R&D on more hardware and software security and privacy mechanisms for
resource-constrained IoT systems, particularly targeted towards start-ups and
individual entrepreneurs that lack resources to easily develop this functionality.
• Incentives for companies to develop new mechanisms to improve transparency
of IoT personal data use, and for gaining informed consent from individuals
concerned when sensitive data is gathered or inferences drawn.
• Greater use of Privacy Impact Assessments by organisations building and
configuring IoT systems.
• Development of further guidance from global privacy regulators on application
of the principles of data minimisation and purpose limitation in IoT systems.
• More cooperation between telecoms and other regulators such as privacy/data
protection agencies.

More Related Content

What's hot

Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security
Glenn McKnight
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
Business Finland
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
Paul van Heel
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19
Ahmed Banafa
 
Cyber trust: cornerstone of a digital world
Cyber trust: cornerstone of a digital worldCyber trust: cornerstone of a digital world
Cyber trust: cornerstone of a digital world
Leonardo
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain management
Ahmed Banafa
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawRizkiawan Achadi
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Oxford Martin Centre, OII, and Computer Science at the University of Oxford
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawftii
 
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
TRPC Pte Ltd
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
Charles Mok
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmannsegughana
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020
Ahmed Banafa
 
Border security: a physical and digital challenge
Border security: a physical and digital challengeBorder security: a physical and digital challenge
Border security: a physical and digital challenge
Leonardo
 
Security and Privacy in Pegulated Environments
Security and Privacy in Pegulated EnvironmentsSecurity and Privacy in Pegulated Environments
Security and Privacy in Pegulated Environments
Francis Amaning
 
I4ADA 2019 - Presentation Jacques Kruse Brandao
I4ADA 2019 - Presentation  Jacques Kruse BrandaoI4ADA 2019 - Presentation  Jacques Kruse Brandao
I4ADA 2019 - Presentation Jacques Kruse Brandao
Paul van Heel
 
Singapore: Strong regulatory foundations for effective crisis management (Jon...
Singapore: Strong regulatory foundations for effective crisis management (Jon...Singapore: Strong regulatory foundations for effective crisis management (Jon...
Singapore: Strong regulatory foundations for effective crisis management (Jon...
TRPC Pte Ltd
 
Cyber resilient infrastructure
Cyber resilient infrastructureCyber resilient infrastructure
Cyber resilient infrastructure
Atkins
 

What's hot (20)

Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19
 
Cyber trust: cornerstone of a digital world
Cyber trust: cornerstone of a digital worldCyber trust: cornerstone of a digital world
Cyber trust: cornerstone of a digital world
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain management
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020
 
Border security: a physical and digital challenge
Border security: a physical and digital challengeBorder security: a physical and digital challenge
Border security: a physical and digital challenge
 
Security and Privacy in Pegulated Environments
Security and Privacy in Pegulated EnvironmentsSecurity and Privacy in Pegulated Environments
Security and Privacy in Pegulated Environments
 
I4ADA 2019 - Presentation Jacques Kruse Brandao
I4ADA 2019 - Presentation  Jacques Kruse BrandaoI4ADA 2019 - Presentation  Jacques Kruse Brandao
I4ADA 2019 - Presentation Jacques Kruse Brandao
 
Singapore: Strong regulatory foundations for effective crisis management (Jon...
Singapore: Strong regulatory foundations for effective crisis management (Jon...Singapore: Strong regulatory foundations for effective crisis management (Jon...
Singapore: Strong regulatory foundations for effective crisis management (Jon...
 
Cyber resilient infrastructure
Cyber resilient infrastructureCyber resilient infrastructure
Cyber resilient infrastructure
 

Similar to Regulation and the Internet of Things

An Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdfAn Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdf
CIOWomenMagazine
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
Ahmed Banafa
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
Ahmed Banafa
 
The Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsThe Digital Telecom. Internet of Things
The Digital Telecom. Internet of Things
Parviz Iskhakov, PhD
 
The Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsThe Digital Telecom. Internet of Things
The Digital Telecom. Internet of Things
Parviz Iskhakov
 
Internet of Things And Its Components.pptx
Internet of Things And Its Components.pptxInternet of Things And Its Components.pptx
Internet of Things And Its Components.pptx
Softxai
 
Cellular Narrow Band IoT- using LTE
Cellular Narrow Band IoT- using LTE Cellular Narrow Band IoT- using LTE
Cellular Narrow Band IoT- using LTE
Sukhvinder Singh Malik
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
Ahmed Banafa
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
ezzAyman1
 
IoT
IoTIoT
IoT
Mphasis
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
OdedeleIfeoluwa
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks
 
lee2015.pdf
lee2015.pdflee2015.pdf
lee2015.pdf
BabarHameed6
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and Trends
Dennis Jacob
 
Varun IOTs PPT
Varun  IOTs PPTVarun  IOTs PPT
Varun IOTs PPT
varun srivastava
 
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxThe-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
HadHic
 

Similar to Regulation and the Internet of Things (20)

An Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdfAn Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdf
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
The Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsThe Digital Telecom. Internet of Things
The Digital Telecom. Internet of Things
 
The Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsThe Digital Telecom. Internet of Things
The Digital Telecom. Internet of Things
 
Internet of Things And Its Components.pptx
Internet of Things And Its Components.pptxInternet of Things And Its Components.pptx
Internet of Things And Its Components.pptx
 
Cellular Narrow Band IoT- using LTE
Cellular Narrow Band IoT- using LTE Cellular Narrow Band IoT- using LTE
Cellular Narrow Band IoT- using LTE
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
Future of Internet.pptx
Future of Internet.pptxFuture of Internet.pptx
Future of Internet.pptx
 
IoT
IoTIoT
IoT
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
 
IOT PPT.pptx
IOT PPT.pptxIOT PPT.pptx
IOT PPT.pptx
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
M2M_IoT_Presentation
M2M_IoT_PresentationM2M_IoT_Presentation
M2M_IoT_Presentation
 
lee2015.pdf
lee2015.pdflee2015.pdf
lee2015.pdf
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and Trends
 
Varun IOTs PPT
Varun  IOTs PPTVarun  IOTs PPT
Varun IOTs PPT
 
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxThe-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
 

More from blogzilla

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
blogzilla
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
blogzilla
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
blogzilla
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
blogzilla
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
blogzilla
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
blogzilla
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
blogzilla
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
blogzilla
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
blogzilla
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
blogzilla
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
blogzilla
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
blogzilla
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
blogzilla
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
blogzilla
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
blogzilla
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
blogzilla
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
blogzilla
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
blogzilla
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloud
blogzilla
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?blogzilla
 

More from blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloud
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
 

Recently uploaded

Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
GrantManagementInsti
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
ahcitycouncil
 
Counting Class for Micro Observers 2024.pptx
Counting Class for Micro Observers 2024.pptxCounting Class for Micro Observers 2024.pptx
Counting Class for Micro Observers 2024.pptx
Revenue Department Kerala State
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
850fcj96
 
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our OrganizationUp the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
uptheratios
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Congressional Budget Office
 
PACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdfPACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdf
Mohammed325561
 
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
RIDPRO11
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
ClaudioTebaldi2
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
Antti Rautiainen
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
evkovas
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
ehbuaw
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
ILC- UK
 
Canadian Immigration Tracker March 2024 - Key Slides
Canadian Immigration Tracker March 2024 - Key SlidesCanadian Immigration Tracker March 2024 - Key Slides
Canadian Immigration Tracker March 2024 - Key Slides
Andrew Griffith
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
ehbuaw
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
JSchaus & Associates
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
oklahomajudicialproc1
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
Paul Smith
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
ehbuaw
 

Recently uploaded (20)

Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
 
Counting Class for Micro Observers 2024.pptx
Counting Class for Micro Observers 2024.pptxCounting Class for Micro Observers 2024.pptx
Counting Class for Micro Observers 2024.pptx
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
 
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our OrganizationUp the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
 
PACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdfPACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdf
 
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
 
Canadian Immigration Tracker March 2024 - Key Slides
Canadian Immigration Tracker March 2024 - Key SlidesCanadian Immigration Tracker March 2024 - Key Slides
Canadian Immigration Tracker March 2024 - Key Slides
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
 

Regulation and the Internet of Things

  • 1. Regulation and the Internet of Things 15th Global Symposium for Regulators (GSR15) Prof. Ian Brown The views expressed in this presentation are those of the author and do not necessarily reflect the opinions of the ITU or its Membership.
  • 2. DEFINITIONS • ITU-T: “A global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies.” • Concretely: remotely linked tags, sensors and actuators, increasingly being built into objects throughout the physical world, driven by ongoing rapid falls in the cost of microchips, sensors and communications capacity. • Protocols: NFC, RFID, medical implants, M2M dedicated networks, ZigBee, Bluetooth, 2G/3G/4G, Wi-Fi, ITS • Expectations that tens of billions of IoT devices deployed in next decade, driving economic value in $trillions
  • 3. POPULAR APPLICATIONS Individual Society GPS, Fitbits Visa PayWave Mastercard Paypass Employee passes Individual person Immediate friends/ family; banks; employers Mobile money Fitness data, GPS location-based data Egs. Smart Cities Smart Grids Community IoT Data Intended Audience Smartphones Wearables Connected Cars Health devices Smart homes GP, health authorities; health & car insurance; Police Wider friends, social networks Authorities/regulators Utility companies; Other citizens Smart metering; Smart water meters Traffic monitoring Electricity/water consumption & billing; Traffic flow data Intelligent Transport Systems Event Data Recorders (EDRs) Blood pressure monitors; remote burglar/heating systems Speed, distance, airbag, crash locations/alerts; Heart rate, blood pressure, Diet; remote heating data Level
  • 4. DIVERSITY OF IOT APPLICATIONS
  • 5. REGULATORY ISSUES • Licensing and spectrum management • Switching and roaming • Addressing and numbering • Competition • Security and privacy
  • 6. LICENSING AND SPECTRUM MANAGEMENT Goal: Ensure spectrum is available for a wide range of IoT applications, at short and long range, in licensed and unlicensed bands. Best practice: Monitor availability of spectrum for short and long- range IoT communications and backhaul network capacity. Encourage 4G deployment and use of small-cell technology. Potential measures: Further experimentation with use of white space and shared-space technology. Encourage development of LTE-A and 5G networks, and keep need for IoT-specific spectrum under review.
  • 7. Source: ITU. SWITCHING AND ROAMING Goal: Encourage development of SIMs and mobile network accounts suitable for large M2M users, roaming mobile devices, and fixed devices in areas of poor reception. Best practice: Mobile network operators develop M2M-specific business units with appropriate billing and management. Further development and deployment of embedded, remotely provisioned SIMs in M2M systems. Potential measures: Global agreement on updated E.212 standards, making appropriate use of GSMA standards. Provision of Mobile Network Codes to IoT service providers.
  • 8. ADDRESSING AND NUMBERING Goal: Large address space needed for globally addressable things (although many IoT devices only need local connectivity). Best practice: Deployment of IPv6 by ISPs, public and private sector organisations. Use of IMSI for M2M applications. Potential measures: Universal IPv6 adoption by governments in their own services and procurements, and other incentives for private sector adoption.
  • 9. COMPETITION Goal: Avoid IoT user lock-in and new barriers to entry. Best practice: Ensure competition regulators have capability to monitor IoT markets for abuses of dominant positions. Provide institutional mechanism for ongoing review of laws and regulations for impact on IoT competitiveness. Potential measures: Consider measures to increase interoperability through competition and consumer law. Give users a right to easy access to raw data. Support global standardisation and deployment of remotely provisioned SIMs for greater M2M competition.
  • 10. SECURITY AND PRIVACY Goal: Significantly reduce security vulnerabilities in IoT systems, which let attackers access private data and cause physical harm in cases such as medical devices and connected vehicles. • Encourage security and vulnerability patching of devices. • Smart city vulnerabilities can be hard to fix due to legacy systems, but present significant safety issues (e.g. in traffic lights). Ensure individual control of profiles, which can be used to infer sensitive personal information, such as medical disorders. Reduce potential for discrimination in employment, financial and healthcare services. Best practice: Ensuring security and privacy from outset of IoT system design process. Development of co-regulation by all stakeholders to protect security and privacy. Further development of privacy and consumer protection rules to ensure security testing of IoT systems that process sensitive personal data.
  • 11. SECURITY AND PRIVACY - POTENTIAL MEASURES • R&D on more hardware and software security and privacy mechanisms for resource-constrained IoT systems, particularly targeted towards start-ups and individual entrepreneurs that lack resources to easily develop this functionality. • Incentives for companies to develop new mechanisms to improve transparency of IoT personal data use, and for gaining informed consent from individuals concerned when sensitive data is gathered or inferences drawn. • Greater use of Privacy Impact Assessments by organisations building and configuring IoT systems. • Development of further guidance from global privacy regulators on application of the principles of data minimisation and purpose limitation in IoT systems. • More cooperation between telecoms and other regulators such as privacy/data protection agencies.