This document discusses standards, legal and privacy issues related to the Internet of Things (IoT) in India. It covers several topics:
1. It outlines global and Indian policy initiatives and standardization activities related to machine-to-machine (M2M) communications and IoT.
2. It compares different wired and wireless communication technologies used for IoT.
3. It discusses the role of IoT in India's Smart City Mission.
4. The document then analyzes privacy issues in the IoT ecosystem under Indian law. It also examines proposed privacy legislation and recommendations.
5. Finally, it discusses other legal issues regarding data ownership, copyright, contract validity, and product liability
Take a close look at the complete guide on how to set up and use the SafeDNS service. In it you will find answers to the most common questions that arise when using SafeDNS.
With the help of this guide you can easily configure internet filtering on any device, learn how to efficiently use additional features, a filtering schedule and separate filtering policies, as well as find answers to key questions about buying a license and extending the SafeDNS service.
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Alan McSweeney
This paper describes how technologies such as data pseudonymisation and differential privacy technology enables access to sensitive data and unlocks data opportunities and value while ensuring compliance with data privacy legislation and regulations.
The document provides guidance on establishing an effective information security program. It outlines a security process with five key areas: risk assessment, security strategy, control implementation, monitoring, and continuous updating. It emphasizes the importance of governance, with clear roles and responsibilities for the board, senior management, and other parties. The board is responsible for overseeing the program, while management is accountable for implementation and ongoing risk management.
NPY Rule Book [constitution] catsi act approved at 14.11.08npywc
The document is the rule book of the Ngaanyatjarra Pitjantjatjara Yankunytjatjara Women’s Council Aboriginal Corporation. It outlines 21 sections covering topics such as membership, meetings, directors, finances, dispute resolution and winding up the corporation. The rule book complies with the Corporations (Aboriginal and Torres Strait Islander) Act 2006 and establishes the guidelines and procedures for operating the organization.
Systems Analysis And Design Methodology And Supporting ProcessesAlan McSweeney
This document outlines the methodology and processes for systems analysis and design. It discusses the project initiation phase which involves setting objectives, scope, benefits, timeline, and costs. It also covers the analysis phase which focuses on requirements gathering and modeling. The enterprise modeling phase is described as developing information models, architectures, and technology plans. Specific project deliverables are provided for each phase.
Annual Report and Accounts 2012-13 FINAL(including Quality&Accounts)Kevin-Alan Pugh
The annual report summarizes the activities of Mid Staffordshire NHS Foundation Trust for the period of April 2012 to March 2013. Key events included Monitor appointing a Contingency Planning Team to review clinical services due to sustainability concerns, publication of the Francis Report on failings at the Trust, and Monitor subsequently appointing Trust Special Administrators in April 2013 due to ongoing sustainability issues. The report outlines improvements made in patient care and clinical outcomes over the past year, but acknowledges further work is still needed.
Baseline survey of basic health service package paid by health insurance fund...HFG Project
The baseline survey will provide a set of evidence which will be used for the guidelines to support the implementation of Vietnam’s basic healthcare service pilot (BHSP) pilot, in which HIV/AIDS sub-package will be in focus. The survey will examine the relevance and feasibility of BHSP as well as identify the necessary conditions (such as human resources, infrastructure, facilities, supplies, and information/financial/management systems) for successfully implementing BSHP. The survey will provide inputs for the BSHP pilot study, which will be followed in order to evaluate the impact of BHSP on the insured members, health facilities, and VSS administrators. Empirical findings and implementation lessons learned from the BSHP pilot study will be used to develop relevant circular and to scale up BHSP at the national level
Microsoft project server 2010 project managers guide for project web appApimuk Siripitupum
This document provides a guide for project managers on using Project Web App in Microsoft Project Server 2010. It begins with an introduction and overview of the software. It then covers navigating and using the main areas of Project Web App to manage projects, resources, task updates, and other project components like risks, issues, and documents. The guide contains several chapters that describe key functions for creating and modifying project plans, assigning and tracking resources, submitting and approving task updates, and more through the different areas within Project Web App.
Take a close look at the complete guide on how to set up and use the SafeDNS service. In it you will find answers to the most common questions that arise when using SafeDNS.
With the help of this guide you can easily configure internet filtering on any device, learn how to efficiently use additional features, a filtering schedule and separate filtering policies, as well as find answers to key questions about buying a license and extending the SafeDNS service.
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Alan McSweeney
This paper describes how technologies such as data pseudonymisation and differential privacy technology enables access to sensitive data and unlocks data opportunities and value while ensuring compliance with data privacy legislation and regulations.
The document provides guidance on establishing an effective information security program. It outlines a security process with five key areas: risk assessment, security strategy, control implementation, monitoring, and continuous updating. It emphasizes the importance of governance, with clear roles and responsibilities for the board, senior management, and other parties. The board is responsible for overseeing the program, while management is accountable for implementation and ongoing risk management.
NPY Rule Book [constitution] catsi act approved at 14.11.08npywc
The document is the rule book of the Ngaanyatjarra Pitjantjatjara Yankunytjatjara Women’s Council Aboriginal Corporation. It outlines 21 sections covering topics such as membership, meetings, directors, finances, dispute resolution and winding up the corporation. The rule book complies with the Corporations (Aboriginal and Torres Strait Islander) Act 2006 and establishes the guidelines and procedures for operating the organization.
Systems Analysis And Design Methodology And Supporting ProcessesAlan McSweeney
This document outlines the methodology and processes for systems analysis and design. It discusses the project initiation phase which involves setting objectives, scope, benefits, timeline, and costs. It also covers the analysis phase which focuses on requirements gathering and modeling. The enterprise modeling phase is described as developing information models, architectures, and technology plans. Specific project deliverables are provided for each phase.
Annual Report and Accounts 2012-13 FINAL(including Quality&Accounts)Kevin-Alan Pugh
The annual report summarizes the activities of Mid Staffordshire NHS Foundation Trust for the period of April 2012 to March 2013. Key events included Monitor appointing a Contingency Planning Team to review clinical services due to sustainability concerns, publication of the Francis Report on failings at the Trust, and Monitor subsequently appointing Trust Special Administrators in April 2013 due to ongoing sustainability issues. The report outlines improvements made in patient care and clinical outcomes over the past year, but acknowledges further work is still needed.
Baseline survey of basic health service package paid by health insurance fund...HFG Project
The baseline survey will provide a set of evidence which will be used for the guidelines to support the implementation of Vietnam’s basic healthcare service pilot (BHSP) pilot, in which HIV/AIDS sub-package will be in focus. The survey will examine the relevance and feasibility of BHSP as well as identify the necessary conditions (such as human resources, infrastructure, facilities, supplies, and information/financial/management systems) for successfully implementing BSHP. The survey will provide inputs for the BSHP pilot study, which will be followed in order to evaluate the impact of BHSP on the insured members, health facilities, and VSS administrators. Empirical findings and implementation lessons learned from the BSHP pilot study will be used to develop relevant circular and to scale up BHSP at the national level
Microsoft project server 2010 project managers guide for project web appApimuk Siripitupum
This document provides a guide for project managers on using Project Web App in Microsoft Project Server 2010. It begins with an introduction and overview of the software. It then covers navigating and using the main areas of Project Web App to manage projects, resources, task updates, and other project components like risks, issues, and documents. The guide contains several chapters that describe key functions for creating and modifying project plans, assigning and tracking resources, submitting and approving task updates, and more through the different areas within Project Web App.
Thesis and Dissertation Guide 2013 According to Cornell UniversityTranscription Star
This document provides guidelines for formatting and submitting theses and dissertations at Cornell University. It outlines requirements for page size, font, margins, spacing, tables, and figures. It also lists the required and recommended sections for the document and provides formatting suggestions for key sections like the title page, abstract, and body. Finally, it includes checklists, timelines, required forms, and information on fees for submitting the thesis or dissertation.
The document provides findings from a study on urban violence in Nakuru County, Kenya. It identifies the main forms of violence as sexual and gender-based violence (SGBV), violence against children, violent crime, police violence, and political/ethnic violence. SGBV and violence against children were highlighted by over 70% and 66% of respondents respectively as significant challenges often occurring in households. Youth and women/girls were identified as the main victims. Unemployment, poverty, and drug/alcohol abuse were cited as the primary causes of violence. The study assessed various interventions and found gaps in approaches and coverage. Recommendations focus on prevention, including awareness programs incorporating trusted community actors, empowering youth and victims
Media Law, Ethics & Human Rights by KATAMU EDDY NEDINANIKATAMU NEDINANI
This document provides an overview of media law and ethics in Uganda. It contains information on key topics such as the definition of ethics, the historical development of media ethics, ethical issues in journalism, and justifications for media ethics. It also outlines Uganda's professional code of ethics for journalism. Regarding media law, the document discusses sources of media law, differences between civil and criminal law, and examples of criminal cases like sedition and contempt of court. Civil cases involving issues like trespass, assault, and defamation are also examined. Overall, the document serves as a guide for media law and practice in Uganda.
Born wills intelligence_oversight_tk_en copiamag88
This document is a toolkit for overseeing intelligence services published by DCAF, an international foundation dedicated to security sector governance. It contains seven tools that provide guidance on establishing effective intelligence oversight systems. The tools cover topics such as introducing intelligence oversight, establishing oversight systems, balancing transparency and secrecy, conducting oversight activities, overseeing information collection, use of personal data, and information sharing. The overall aim of the toolkit is to help states develop robust yet practical oversight of their intelligence services in accordance with democratic principles and human rights.
This document provides best practices for federal agencies acquiring cloud computing services. It covers topics such as selecting cloud service models, crafting service level agreements, defining roles and responsibilities, addressing security, privacy, e-discovery, FOIA and records management concerns. The document aims to help agencies maximize efficiency and compliance when procuring cloud computing from external providers.
Abstract
The recent and emerging development in today’s technology has driven the business trend to adopt these technologies to improve productivity, expandability, performance, innovation and all aspects that increase prosperity ongoing development of new sources of income while decreasing the costs. Banks are one of the major players of today’s business developments, which adopt ICT in their daily activities. This Study employed quantitative approach using an online survey of questionnaires and respondents to collect information on ICT related problems on online banking in Nigerian Banks. SPSS was also made use of in the analysis. The study revealed that ICT related a problem on online Banking has an impact on banks. We try to get insight of the major factors affecting the business of banks as an impact of adopting ICT and study the problems surrounding the use of ICT that impact the usage on online banking services in Nigerian banks.
Describing the Organisation Data LandscapeAlan McSweeney
Outlines an Approach to Describing the Organisation Data Landscape to Assist with Data Transformation Analysis and Planning
The Data Landscape is a representation of the organisation’s data entities and their relationships, interfaces and data flows. Data entities are data asset components that perform data-related functions, from data storage to data transfer and data processing within the Data Landscape.
The objective of developing a Data Landscape model is to define an approach for formally and exactly defining the operation and use of data at a high-level within the organisation and to plan for future changes. It allows the enterprise data fabric to be defined and modelled.
Creating a data landscape view is important as data underpins the operation of information technology solutions and business processes. Data breathes life into solutions as its flows through the organisation. The optimum and most cost-effective design of the data landscape is therefore important. Similarly, solutions that are developed or acquired and deployed on the data landscape
The nature of the organisation data landscape is changing as organisations are undergoing a data transformation.
This document provides a literature review on the Marcellus Shale formation located in the Appalachian region. It discusses the geology and location of the Marcellus Shale, which spans across multiple states. The document also reviews drilling, completion, stimulation and production methods for natural gas from the Marcellus Shale. It examines the transportation and processing of natural gas as well as relevant policies and regulations. The engineering design section proposes a development plan for drilling, water usage, wastewater treatment, permitting and infrastructure in Susquehanna County, PA.
This document provides an overview of geolocation technologies in LTE networks. It discusses the LTE network architecture including the E-UTRAN and EPC components. It describes the LTE radio protocol architecture including the user plane and control plane stacks. The document then focuses on geolocation aspects in LTE, outlining the control plane and user plane positioning approaches. It discusses the LPP and SUPL positioning protocols and technologies like E-CID, TDOA and A-GNSS. Indoor geolocation techniques including triangulation methods and wireless technologies are also covered. Finally, geolocation on iOS and Android platforms and other systems like GLONASS are summarized.
This document is the master's thesis of Tesfay Aregay submitted to the University of Twente in 2014. The thesis defines research conducted to identify highly influential ranking factors for search engines. It presents two approaches - calculating correlation between ranking factors and webpage rank, and training ranking models to select important features. The thesis provides results analyzing ranking factors for a Dutch web dataset and a Learning to Rank benchmark dataset. It evaluates the approaches and identifies ranking factors that positively impact search engine rankings.
The Asian-Pacific Regional Round of the ELSA Moot Court Competition was held in Kuala Lumpur, Malaysia from February 28th to March 3rd, 2014. 26 teams from various universities in Asia and Australia participated in the preliminary rounds. Teams were scored based on their written submissions (30%) and oral pleadings (70%). The top teams based on their total scores advanced to the later rounds.
Les ministres français et allemand de l'Economie, Bruno Le Maire et Peter Altmaier, ont présenté jeudi un document de 40 pages sur le futur cloud européen.
Capstone jordan new award metrics for sustainability_finalLuke Statz
This document proposes new metrics for a sustainability award program in Jordan. It recommends establishing a sustainability pillar within the existing King Abdullah II Award for Excellence, with tiered criteria and metrics in areas like energy use, emissions, water use, waste management, and social impact. Key elements include sustainability best practices, sector-specific guidelines, weighted metrics, and an educational program to help applicants and assessors understand the criteria. The goal is to incentivize more sustainable operations among Jordanian businesses and organizations through recognition and skills development.
This document provides an introduction to YieldCos and renewable energy stocks. It discusses the investment climate surrounding renewable energy, including government policies and incentives that have encouraged solar and wind energy development. YieldCos emerged as a way to raise funds for renewable energy projects by aggregating operating renewable energy assets into publicly traded companies. The document outlines the problem of volatility in YieldCo stocks due to their novelty and lack of historical data. It states that the purpose of this research is to analyze YieldCo valuation methods and provide recommendations to investors using updated performance information.
The 2008 battle of sadr city reimagining urban combatMamuka Mchedlidze
This document provides an overview of the 2008 Battle of Sadr City in Baghdad, Iraq between U.S. forces and the Jaish al-Mahdi (JAM) militia. It describes how U.S. forces had regained control of most of Baghdad through the Surge and Baghdad Security Plan, isolating Sadr City. On the eve of the battle, JAM controlled Sadr City and was launching rocket and mortar attacks. U.S. forces conducted training to prepare for urban combat and counterinsurgency operations. The battle began with a JAM onslaught, but U.S. forces stopped the attacks using aerial surveillance and strikes. They then seized the initiative with
This document provides an overview and quick start guide for search engine optimization (SEO). It begins with tips for picking keywords, domain names, and hosting. It recommends optimizing page titles, meta tags, headings, and copy for keywords. The guide also covers link building, directories, monitoring results, and paid advertising. The overall aim is to help websites rank higher in search engines and get more natural traffic from keywords.
The document discusses data protection in the European Union and the role of national data protection authorities. It notes that the EU has played a pioneering role in establishing data protection as a fundamental right. However, it also identifies some challenges for the EU data protection system, such as ensuring effective enforcement and compliance. The document examines topics like the independence, powers, and activities of national data protection authorities. It provides a comparative overview of data protection across EU member states and analyzes some deficiencies in EU data protection laws and their application.
This document is a best practices guide for Information Lifecycle Management (ILM) published by IBM. It provides an overview of ILM concepts and strategies. The guide contains three parts that cover ILM basics, key building blocks, and ILM strategies and solutions. It is intended to help organizations effectively manage the lifecycles of their information assets through the use of automated policies and tiered storage systems.
The National Science and Technology Council's Task Force on Identity Management was established to assess the current state of identity management (IdM) across the U.S. government and develop a vision for the future. The Task Force found that over 3,000 federal systems currently utilize personally identifiable information (PII) in an inconsistent and duplicative manner. The Task Force proposed a new framework that includes: 1) A "network of networks" to securely manage common PII elements across agencies; 2) Strong security, privacy and auditability standards; and 3) Ubiquitous yet controlled access to verified identity data. This proposed approach aims to improve accuracy, availability, privacy and coordination of IdM across the federal government.
This whitepaper discusses distributed ledger technology (DLT), also known as blockchain technology. It provides an introduction to DLT, explaining the basic building blocks and how it works. It also covers various DLT platforms like Bitcoin, Ethereum, Hyperledger and Corda. The whitepaper addresses technology aspects like security and privacy, as well as non-technical considerations regarding governance, regulation and legal issues. It includes the results of several proof-of-concept projects testing the use of DLT for applications such as mortgage lending, trade finance and digital identity management.
Thesis and Dissertation Guide 2013 According to Cornell UniversityTranscription Star
This document provides guidelines for formatting and submitting theses and dissertations at Cornell University. It outlines requirements for page size, font, margins, spacing, tables, and figures. It also lists the required and recommended sections for the document and provides formatting suggestions for key sections like the title page, abstract, and body. Finally, it includes checklists, timelines, required forms, and information on fees for submitting the thesis or dissertation.
The document provides findings from a study on urban violence in Nakuru County, Kenya. It identifies the main forms of violence as sexual and gender-based violence (SGBV), violence against children, violent crime, police violence, and political/ethnic violence. SGBV and violence against children were highlighted by over 70% and 66% of respondents respectively as significant challenges often occurring in households. Youth and women/girls were identified as the main victims. Unemployment, poverty, and drug/alcohol abuse were cited as the primary causes of violence. The study assessed various interventions and found gaps in approaches and coverage. Recommendations focus on prevention, including awareness programs incorporating trusted community actors, empowering youth and victims
Media Law, Ethics & Human Rights by KATAMU EDDY NEDINANIKATAMU NEDINANI
This document provides an overview of media law and ethics in Uganda. It contains information on key topics such as the definition of ethics, the historical development of media ethics, ethical issues in journalism, and justifications for media ethics. It also outlines Uganda's professional code of ethics for journalism. Regarding media law, the document discusses sources of media law, differences between civil and criminal law, and examples of criminal cases like sedition and contempt of court. Civil cases involving issues like trespass, assault, and defamation are also examined. Overall, the document serves as a guide for media law and practice in Uganda.
Born wills intelligence_oversight_tk_en copiamag88
This document is a toolkit for overseeing intelligence services published by DCAF, an international foundation dedicated to security sector governance. It contains seven tools that provide guidance on establishing effective intelligence oversight systems. The tools cover topics such as introducing intelligence oversight, establishing oversight systems, balancing transparency and secrecy, conducting oversight activities, overseeing information collection, use of personal data, and information sharing. The overall aim of the toolkit is to help states develop robust yet practical oversight of their intelligence services in accordance with democratic principles and human rights.
This document provides best practices for federal agencies acquiring cloud computing services. It covers topics such as selecting cloud service models, crafting service level agreements, defining roles and responsibilities, addressing security, privacy, e-discovery, FOIA and records management concerns. The document aims to help agencies maximize efficiency and compliance when procuring cloud computing from external providers.
Abstract
The recent and emerging development in today’s technology has driven the business trend to adopt these technologies to improve productivity, expandability, performance, innovation and all aspects that increase prosperity ongoing development of new sources of income while decreasing the costs. Banks are one of the major players of today’s business developments, which adopt ICT in their daily activities. This Study employed quantitative approach using an online survey of questionnaires and respondents to collect information on ICT related problems on online banking in Nigerian Banks. SPSS was also made use of in the analysis. The study revealed that ICT related a problem on online Banking has an impact on banks. We try to get insight of the major factors affecting the business of banks as an impact of adopting ICT and study the problems surrounding the use of ICT that impact the usage on online banking services in Nigerian banks.
Describing the Organisation Data LandscapeAlan McSweeney
Outlines an Approach to Describing the Organisation Data Landscape to Assist with Data Transformation Analysis and Planning
The Data Landscape is a representation of the organisation’s data entities and their relationships, interfaces and data flows. Data entities are data asset components that perform data-related functions, from data storage to data transfer and data processing within the Data Landscape.
The objective of developing a Data Landscape model is to define an approach for formally and exactly defining the operation and use of data at a high-level within the organisation and to plan for future changes. It allows the enterprise data fabric to be defined and modelled.
Creating a data landscape view is important as data underpins the operation of information technology solutions and business processes. Data breathes life into solutions as its flows through the organisation. The optimum and most cost-effective design of the data landscape is therefore important. Similarly, solutions that are developed or acquired and deployed on the data landscape
The nature of the organisation data landscape is changing as organisations are undergoing a data transformation.
This document provides a literature review on the Marcellus Shale formation located in the Appalachian region. It discusses the geology and location of the Marcellus Shale, which spans across multiple states. The document also reviews drilling, completion, stimulation and production methods for natural gas from the Marcellus Shale. It examines the transportation and processing of natural gas as well as relevant policies and regulations. The engineering design section proposes a development plan for drilling, water usage, wastewater treatment, permitting and infrastructure in Susquehanna County, PA.
This document provides an overview of geolocation technologies in LTE networks. It discusses the LTE network architecture including the E-UTRAN and EPC components. It describes the LTE radio protocol architecture including the user plane and control plane stacks. The document then focuses on geolocation aspects in LTE, outlining the control plane and user plane positioning approaches. It discusses the LPP and SUPL positioning protocols and technologies like E-CID, TDOA and A-GNSS. Indoor geolocation techniques including triangulation methods and wireless technologies are also covered. Finally, geolocation on iOS and Android platforms and other systems like GLONASS are summarized.
This document is the master's thesis of Tesfay Aregay submitted to the University of Twente in 2014. The thesis defines research conducted to identify highly influential ranking factors for search engines. It presents two approaches - calculating correlation between ranking factors and webpage rank, and training ranking models to select important features. The thesis provides results analyzing ranking factors for a Dutch web dataset and a Learning to Rank benchmark dataset. It evaluates the approaches and identifies ranking factors that positively impact search engine rankings.
The Asian-Pacific Regional Round of the ELSA Moot Court Competition was held in Kuala Lumpur, Malaysia from February 28th to March 3rd, 2014. 26 teams from various universities in Asia and Australia participated in the preliminary rounds. Teams were scored based on their written submissions (30%) and oral pleadings (70%). The top teams based on their total scores advanced to the later rounds.
Les ministres français et allemand de l'Economie, Bruno Le Maire et Peter Altmaier, ont présenté jeudi un document de 40 pages sur le futur cloud européen.
Capstone jordan new award metrics for sustainability_finalLuke Statz
This document proposes new metrics for a sustainability award program in Jordan. It recommends establishing a sustainability pillar within the existing King Abdullah II Award for Excellence, with tiered criteria and metrics in areas like energy use, emissions, water use, waste management, and social impact. Key elements include sustainability best practices, sector-specific guidelines, weighted metrics, and an educational program to help applicants and assessors understand the criteria. The goal is to incentivize more sustainable operations among Jordanian businesses and organizations through recognition and skills development.
This document provides an introduction to YieldCos and renewable energy stocks. It discusses the investment climate surrounding renewable energy, including government policies and incentives that have encouraged solar and wind energy development. YieldCos emerged as a way to raise funds for renewable energy projects by aggregating operating renewable energy assets into publicly traded companies. The document outlines the problem of volatility in YieldCo stocks due to their novelty and lack of historical data. It states that the purpose of this research is to analyze YieldCo valuation methods and provide recommendations to investors using updated performance information.
The 2008 battle of sadr city reimagining urban combatMamuka Mchedlidze
This document provides an overview of the 2008 Battle of Sadr City in Baghdad, Iraq between U.S. forces and the Jaish al-Mahdi (JAM) militia. It describes how U.S. forces had regained control of most of Baghdad through the Surge and Baghdad Security Plan, isolating Sadr City. On the eve of the battle, JAM controlled Sadr City and was launching rocket and mortar attacks. U.S. forces conducted training to prepare for urban combat and counterinsurgency operations. The battle began with a JAM onslaught, but U.S. forces stopped the attacks using aerial surveillance and strikes. They then seized the initiative with
This document provides an overview and quick start guide for search engine optimization (SEO). It begins with tips for picking keywords, domain names, and hosting. It recommends optimizing page titles, meta tags, headings, and copy for keywords. The guide also covers link building, directories, monitoring results, and paid advertising. The overall aim is to help websites rank higher in search engines and get more natural traffic from keywords.
The document discusses data protection in the European Union and the role of national data protection authorities. It notes that the EU has played a pioneering role in establishing data protection as a fundamental right. However, it also identifies some challenges for the EU data protection system, such as ensuring effective enforcement and compliance. The document examines topics like the independence, powers, and activities of national data protection authorities. It provides a comparative overview of data protection across EU member states and analyzes some deficiencies in EU data protection laws and their application.
This document is a best practices guide for Information Lifecycle Management (ILM) published by IBM. It provides an overview of ILM concepts and strategies. The guide contains three parts that cover ILM basics, key building blocks, and ILM strategies and solutions. It is intended to help organizations effectively manage the lifecycles of their information assets through the use of automated policies and tiered storage systems.
The National Science and Technology Council's Task Force on Identity Management was established to assess the current state of identity management (IdM) across the U.S. government and develop a vision for the future. The Task Force found that over 3,000 federal systems currently utilize personally identifiable information (PII) in an inconsistent and duplicative manner. The Task Force proposed a new framework that includes: 1) A "network of networks" to securely manage common PII elements across agencies; 2) Strong security, privacy and auditability standards; and 3) Ubiquitous yet controlled access to verified identity data. This proposed approach aims to improve accuracy, availability, privacy and coordination of IdM across the federal government.
This whitepaper discusses distributed ledger technology (DLT), also known as blockchain technology. It provides an introduction to DLT, explaining the basic building blocks and how it works. It also covers various DLT platforms like Bitcoin, Ethereum, Hyperledger and Corda. The whitepaper addresses technology aspects like security and privacy, as well as non-technical considerations regarding governance, regulation and legal issues. It includes the results of several proof-of-concept projects testing the use of DLT for applications such as mortgage lending, trade finance and digital identity management.
Review of informal sector for taxation purposesDr Lendy Spires
This document provides a summary of a report on reviewing Tanzania's informal sector for taxation purposes. It finds that the informal sector makes up a large portion of Tanzania's economy and workforce but faces many challenges. The current presumptive income tax system aimed at the informal sector has some benefits but low registration and compliance levels. The report proposes a new simple presumptive income tax with a flat rate, expanded coverage, and strengthened institutional support to help formalize more informal businesses and increase tax revenue.
Tra informal sector_presumptive_income_tax_report_draft_jan11Dr Lendy Spires
This document provides a summary of a study on reviewing Tanzania's informal sector for taxation purposes. Some key findings of the study include:
1) Tanzania has a large informal sector, estimated to account for over 60% of GDP and 80% of employment. However, most informal sector firms are not registered or paying taxes.
2) While Tanzania has developed various policies, laws, and institutions to support the informal sector and taxation, implementation has been inadequate. Compliance levels remain low due to economic and behavioral factors.
3) Tanzania's presumptive income tax system aimed at taxing the informal sector has seen limited success. Collection levels are low despite rising registration numbers.
The study
This document provides an overview of IBM Watson Content Analytics and how it can be used to gain insights from unstructured content. It discusses the architecture of Content Analytics, which includes ingesting and processing unstructured data using natural language processing techniques. It then provides several use case examples where Content Analytics has been applied, such as for customer insights, healthcare, and investigations. The document also covers best practices for designing Content Analytics solutions and understanding the types of analysis that can be performed.
This document provides an overview of IBM Watson Content Analytics and describes how it can be used to gain insights from unstructured content. It discusses the product's history and key features in version 3.0. Some main capabilities include performing automated content analysis, discovering patterns and correlations in data, and gaining insights to improve products and services. The document also provides examples of how Content Analytics has been applied in various use cases, such as customer service, healthcare, and investigations.
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Massimo Talia
This guide aims to provide information on how lawyers will be able to use the opportunities provided by AI tools and how such tools could help the business processes of small firms. Its objective is to provide lawyers with some background to understand what they can and cannot realistically expect from these products. This guide aims to give a reference point for small law practices in the EU
against which they can evaluate those classes of AI applications that are probably the most relevant for them.
This document evaluates the Strategic Decision Support Centers (SDSCs) implemented by the Chicago Police Department.
The SDSCs are real-time crime centers located in each police district that bring together staff, technologies, and data to support policing operations and strategic decision-making. The evaluation assessed SDSC operations, technologies, and the impact on crime rates.
The evaluation found that the SDSCs functioned as intended by facilitating communication and information sharing. Technologies like ShotSpotter, police cameras, and mapping tools supported response to crimes and monitoring of areas. Statistical analyses estimated that SDSCs were associated with moderate reductions in total crime rates of 5-10% in their respective districts.
This document evaluates the Strategic Decision Support Centers (SDSCs) implemented by the Chicago Police Department.
The SDSCs are real-time crime centers located in each police district that bring together staff, technologies, and data to support policing operations and strategic decision-making. The evaluation assessed SDSC operations, technologies, and the impact on crime rates.
The evaluation found that the SDSCs functioned as intended by facilitating communication and information sharing. Technologies like gunshot detection systems and video feeds provided timely data to police. Crime analysis supported strategic planning. However, opportunities for improvement were identified, such as better integrating technologies and standardizing processes across districts.
Statistical analysis found that monthly crime counts, including homic
How Prepared is the Third Sector to Secure their Information - Final Year Pro...Robert Stones
Robert's Final Year Project Dissertation, that focused on the present positioning of Third Sector Organisations; such as Registered Charities and their ability or inability, to secure their own information or, that of their clients and stakeholders in today's Cyber Risk climate.
This document is Telecom Italia S.p.A.'s annual report on Form 20-F filed with the U.S. Securities and Exchange Commission for the fiscal year ended December 31, 2014. It includes information on Telecom Italia's directors, executives, major shareholders, business operations, operating segments, financial statements, legal and regulatory matters, and corporate governance. The report provides details on Telecom Italia's performance and financial position for fiscal year 2014 and prior periods.
This document provides an overview of ethical hacking concepts and techniques, including footprinting, scanning, enumeration, and common tools used. It discusses the goals and processes of attackers, as well as important legal and ethical considerations. Footprinting involves passively gathering open-source information on a target organization like domain names, IP addresses, and technology used. Scanning uses tools like ping sweeps, port scanning with Nmap, and banner grabbing to identify active devices and services on a network. Enumeration discovers additional details about the target through techniques such as NetBIOS sessions, Active Directory information gathering, and SNMP scans. The document stresses the importance of only using these techniques with authorization and for legitimate security evaluation purposes.
This document is a registration statement filed by Telecom Italia S.p.A. with the U.S. Securities and Exchange Commission (SEC). It provides information on Telecom Italia's directors, shareholders, business operations, financial statements, and other regulatory disclosures required by the SEC. Specifically, the document discloses that:
- Telecom Italia is a large telecommunications company based in Italy that offers services across Europe.
- It has different classes of shares that trade on the New York Stock Exchange.
- It operates in highly regulated markets and discusses the key regulations that impact its business.
- Financial information and operating results are provided for 2013 and prior years, along with discussion of liquid
This document provides a summary of copyright and legal issues related to podcasting in Canada. It discusses how copyright, publicity rights, and trademark law can be relevant for podcasters. Permission is generally required to use third-party content like written works, music, and recordings. However, there are some exceptions where permission is not needed, such as for facts, public domain works, or content released under a Creative Commons license. The document provides guidance on copyright clearance for different types of content and analyzes fair use and fair dealing defenses. It also discusses licensing options for distributing podcasts.
This document outlines competencies for federal librarians across several domains, including:
- Foundational competencies like cognitive analysis, communication, emotional intelligence, leadership, professional knowledge, and technology application.
- Functional competencies including collection management, content organization, knowledge management, library leadership and advocacy, library technology management, and reference and research.
- It provides descriptions and examples of the knowledge and skills needed in each competency area.
The document is intended to define the competencies expected of federal librarians and help them evaluate their own skills.
This document is a registration statement and annual report filed by Telecom Italia S.p.A. with the U.S. Securities and Exchange Commission (SEC). It provides information on Telecom Italia's directors, shareholders, business operations, financial results, properties, employees, compensation, and other details required by the SEC. The filing includes Telecom Italia's audited financial statements and notes for the fiscal year ending December 31, 2012, prepared according to International Financial Reporting Standards. It also outlines the company's accounting policies, results of operations, liquidity, research activities, and regulatory environment.
Similar to Standards, Legal and Privacy aspects for IoT (20)
Digital twins for secure, green and healthy future citiesIET India
Most cities across the world are looking at transforming into ‘smart cities’. With the world becoming exponentially digital and data increasing in volume and value, smart cities are now becoming more of a necessity. Most of the countries have been using Digital twins for an effective plan, design, build and management of the cities. While there are different kinds of systems within a city, in this webinar, we discussed four core systems of the city namely: 1) Healthcare system 2) Water management system 3) Safety & Security system 3) Environment system.
Read the report for insights on - creating city twins, predicting the city's future, empowering city administrators to take preventive and proactive actions using digital twins to improve health, safety, traffic, environment, infrastructure in Cities and insights on how to improve the city's Gross Happiness Index.
Download the full report here: https://bit.ly/3lZBHAi
You can also catch the on-demand discussion: https://youtu.be/40faBmjChlc
Leveraging blockchain to transform rattled supply chainsIET India
Covid-19 has disrupted supply chains beyond an unlikely return to the pre-pandemic levels. With dependency reducing on exports and emphasis on vocal for local, blockchain technology can play an influencing role in tackling supply chain failures.
Read our report that throws light on how #blockchain technology can re-define #supplychains. Gain insights on the impact, challenges and opportunities of plugging the technology into the existing #supplychain framework.
Download the complete report here: https://bit.ly/33Xux9r
Catch the on-demand discussion here: https://youtu.be/VZBoxs2_6pg
Ventilator tracking for Covid-19 preparednessIET India
Shortage of ventilators is a grave reality across the globe as covid cases continue to rage.
The Healthcare working group of our Future Tech Panel, have created a blueprint to address the challenge of ventilator shortage in the country.
In this paper, we propose technological frameworks that will enable hospitals and medical institutions effective track medical assets – their availability, live location, existing condition, etc. The proposed solution aims to provide care to those who need in need.
Read the report for a quick and effective solution for tracking ventilator availability in the country.
Electric vehicle charging infrastructure in India: Challenges and road aheadIET India
Charging infrastructure is the backbone for EV adoption in India, in the same way as Internet was for e-commerce. The Government of India announced an outlay of ₹10,000 crore for
FAME 2 to boost the number of electric vehicles in India and a total of ₹1,000 crore has been earmarked for setting up charging stations for EVs. Much of the remaining policy are
behavioural modifications and demand incentives for end users. However, the adoption relies heavily on how we crack the chicken and egg situation of charging infrastructure.
IET’s Future of Mobility and Transport Panel brought together a set of EV infrastructure experts drawn from organisations representing battery manufacturers, fleet operators, charging service providers, fintech firms as well as the Government of India in a bid to articulate current challenges in adoption of EV vehicles in India. Read the report to get answers to your questions regarding: Should fleet owners go beyond their core competency and deploy charging infrastructure or should the government plan for the demand? What will the numbers look like in 3 years? How
can demand load planning be done with the distribution companies? What business models will be successful?
The global pandemic has had a massive socio-economic impact on the urban mobility sector. As the government eases lockdown measures, urban mobility is becoming a huge focus of anxiety, with a large number of people considering when and how to resume travel. This implies that the transport system will have to be re-designed such that passengers are at a safe enough distance from each other. Serious questions like: will personal vehicles become the safest means to travel? What about the safety of people who cannot afford personal vehicles? What will happen to the present mode of public transport, will need answers.
This report titled, “Resetting for Urban Mobility 2020+ in India” discusses challenges brought in the urban mobility space by the COVID-19 pandemic. The document highlights the key measures to be taken at both the government and individual levels as public
transportation across the globe begins to unlock. Viewpoints from London, Singapore, and India – on the future of urban planning and public transport in response to the ongoing pandemic have also been discussed in this document. Experts from these counties contribute to a deeper understanding of safety measures adopted.
Learning and Skilling - A Future Work PerspectiveIET India
Businesses seem to be changing at a relentless pace with the advent of AI and big data. Organisations exist in a VUCA (Volatility, Uncertainty, Complexity, and Ambiguity) state rather than anticipating known risks. Change is the new normal and here to stay, we need to embrace it.
Upskilling and staying relevant are much needed during these trying times and staying calm and focused can help put things in perspective.
Ability to adapt is the most important skill at a time when companies are undergoing digital transformation and this skill takes precedence over technical knowledge, communication skills or problem solving – all of which are touted as important 21st century skills. But how do individuals as well as organisations build this crucial skill?
View the report to know how to bridge the skill gap
Enabling Indian manufacturing MSMEs for global competitivenessIET India
This document discusses opportunities for the MSME sector in India in the post-COVID era. It notes that COVID-19 has disrupted global supply chains and more companies are looking to India for manufacturing. However, for Indian MSMEs to capitalize, they need to adopt new business models and technologies. The document outlines challenges MSMEs face related to quality, supply chains, skills, and recommends solutions like digital platforms, IoT, cloud computing and more to help MSMEs become more efficient, flexible and globally competitive. Government support through policies improving the business environment are also encouraged to help MSMEs drive growth and employment in India.
Indo-Canada dialogue: Opportunities in the automotive segment in the backdrop...IET India
On the 3 February 2020, the Institution of Engineering and Technology (IET) and the High Commission of Canada organised a joint round table on the topic ‘Opportunities in the automotive segment in the backdrop of Industry 4.0 – An Indo-Canadian Start-up Dialogue.’ The discussion revolved around diverse perspectives on how the Indian and Canadian automotive industry is gearing towards embracing new-age technology and what new offerings exist for companies based out of countries like Canada - especially in the back drop of Industry 4.0
E-mobility trends in India: Challenges and OpportunitiesIET India
India is the 4th largest automotive industry in the world and is rapidly adopting connectivity and other advanced technologies in the mobility segment. The recent approval from the Government of India for the second phase of the Faster Adoption and Manufacturing of Electric vehicles (FAME 2) is a clear signal of the country’s positive intent in striding towards green mobility.
IET’s Future of Mobility and Transport Panel has brought together experts from the e-mobility industry in India to discuss the technological trends in the e-mobility space and ways of optimising e-mobility use for everyday life. This document gives a brief summary of the discussions that shed light on the progress of e-mobility in India, pressing challenges that lie ahead and the way forward for e-mobility in the country. Experts also discussed the technology driven trends faced by the Indian market and how these will impact mobility behaviour in India.
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India
Due to COVID-19, schools and colleges are non-operational across India, physically. Although there is no immediate disruption to education and teaching, learning has almost moved entirely from physical to virtual. This presents an added responsibility and stress for parents to keep their children safe from cyber criminals who could be trying to leverage this opportunity to lure online users to click on malicious links and files. The IET’s Cybersecurity Working Group has put together some best practices to be followed to safeguard children from becoming targets of malware and thus, to protect them cyber threats.
IET India cybersecurity advisory: security practices for remote workingIET India
We are living in a heightened time of cyber risk. Organisations are still operational by allowing their employees to work from home. Cybercriminals have started taking advantage of public fear to generate coronavirus themed phishing attacks. We should be aware of COVID-19 tagged emails with misleading links or attachments. The IET’s Cybersecurity working group has put together some best practices to be followed at this crucial time to safeguard employees and as well as organisations that are navigating the new order of remote working.
Read ahead to know steps that both organisations and individual employees can undertake to do their bit to secure their enterprise data.
Urban mobility in Bengaluru- Key takeaway reportIET India
A round table session in Bengaluru with 12 handpicked global experts representing various areas of the global mobility ecosystem was organised in October 2019. The discussion titled ‘Urban Mobility- the Next Decade’ aimed to assess challenges that are preventing the Indian cities from reaching their fullest urban potential. The discussion was led by Shashi Verma, Director of Strategy and Chief Technology Officer, Transport for London. Outcomes from the discussion and a proposed agenda for action for Bengaluru city have been finalised and presented here
IET's Engineering the Future of Work PlaybookIET India
The IET’s Engineering the Future of Work playbook has been designed as a comprehensive guide to navigate the ever-changing world of work. This has a series of articles with perspectives on how technology might shape the future for work and highlights the best practices for meaningful work. It is aimed at creating a guideline that would help build organisational designs and policies feasible for the Future of Work domain.
This whitepaper focuses on the impact of IoT on the Society, how it is reshaping the world around us. The challenges of navigating the transition are great as well. The individual,
organizational, governmental and societal adjustments are non-trivial, and the impact of these
adjustments will be felt by everyone. The speed of various aspects of the transition are hard to
predict, but it is not difficult to see that our world will function quite differently 10-15 years from
now. Being prepared to navigate the transition begins with awareness of the shifts to come and some understanding of their implications, and this paper is a start at raising the awareness.
This white paper dwells upon some of the finer and crucial factors on IIoT adoption in India - is India as a market ready for accepting IIoT, what is the market potential, what are the challenges / road blocks, how DIGITAL INDIA & MAKE IN INDIA programs are propelling the emanation and adoption of IIoT technology, along with some of the IIoT use cases to address and improve output, efficiency, reduction in energy consumption & GHG.
The Internet of Things (IoT) already helps billions of people. Thousands of smart, connected devices deliver new experiences to people throughout the world. Examples include connected cars, robotic manufacturing, smarter medical equipment, smart grid, countless industrial control systems and many more. Unfortunately, this growth in connected devices brings increased security risks. Threats quickly evolve to target this rich and vulnerable landscape. Serious risks include physical harm to people, prolonged downtime, and damage to equipment such as pipelines, blast furnaces, power generation facilities etc. As several such facilities and IoT systems have already been attacked and materially damaged, security must now be an essential consideration for anyone making or operating IoT devices or systems, particularly for the industrial Internet.
How can anyone secure the IoT? IoT systems are often highly complex, requiring end-to-end security solutions that span cloud and connectivity layers, and support resource-constrained IoT devices that often aren’t powerful enough to support traditional security solutions. Security must be comprehensive or attackers simply exploit the weakest link. Of course, traditional Information Technology (IT) systems often drive and handle data from IoT systems, but IoT systems themselves have unique additional security needs.
The security solution should be powerful and easy-to-deploy foundations of security architectures to mitigate the vast majority of security threats to the Internet of Things, including advanced and sophisticated threats. This paper describes the necessity and strategies for easy and effective implementation. No single, concise document can cover all of the important details unique to each vertical. Instead, this paper attempts to provide advice applicable to all verticals, including automotive, energy, manufacturing, healthcare, financial services, government, retail, logistics, aviation, consumer, and beyond.
New World of Energy is where electricity is increasingly distributed and connected, and the flow is bi-directional between smart supply and smart demand. The new ecosystem starts from the supply side of Smart Generation and converges all the way till the Smart Grids from the supply side to the demand side of diverse consumer-ends.
In the area of Smart Generation, there is deep innovation and transformation in areas such as Renewable and Distributed Energy. In Smart Grids, there are huge opportunities for Automation, Demand Response and Distributed Management Systems, including Micro grids. On the demand side, we have Smart Buildings and Homes, Smart Industry and Efficient Data Centres.
Indian telecom getting ready for m2 m iotIET India
M2M/IoT and how it is getting ready for the next revolution. This paper is arranged in three sections and is a summary of study & research of various
documents/papers from various Government organisations, M2M/IoT & Telecom Solution
providers, Standards development organisations, information available on the internet
etc.
l Section 1 - M2M/IoT Telecom guidelines & standards in India today - where are we
and what is defined/being discussed currently
l Section 2 - Mobile network technology, 5G and IoT - why is 5G being discussed /
required for IoT. How do 4G and LPWAN technologies support IoT services
l Section 3 - Captive / Dedicated IoT versus Wide Area Network IoT - what are the
telecom IoT solutions for these use-cases and what technologies work best for short range coverage and wide range coverage.
The document provides several IoT case studies deployed in India across various industries like manufacturing, supply chain, transportation, healthcare, smart governance and utilities. Some key case studies discussed include predictive maintenance of machines using sensors in a food packaging industry, improving efficiency in production using sensors, fleet tracking solutions, remote machine monitoring, smart metering, and more. The case studies showcase how IoT is helping address different business needs and enabling benefits like reduced costs, increased productivity and efficiency.
The presentation deals with the concept of Right to Default Bail laid down under Section 167 of the Code of Criminal Procedure 1973 and Section 187 of Bharatiya Nagarik Suraksha Sanhita 2023.
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee
Presentation slides for a session held on June 4, 2024, at Kyoto University. This presentation is based on the presenter’s recent paper, coauthored with Hwang Lee, Professor, Korea University, with the same title, published in the Journal of Business Administration & Law, Volume 34, No. 2 (April 2024). The paper, written in Korean, is available at <https://shorturl.at/GCWcI>.
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdfSunsetWestLegalGroup
The immediate step is an intelligent choice; don’t procrastinate. In the aftermath of the crash, taking care of yourself and taking quick steps can help you protect yourself from significant injuries. Make sure that you have collected the essential data and information.
1. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
Standards, Legal &
Privacy
Position Statement
2. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
Contents
List of Contributors.........................................................................................................................................4
1. Executive Summary...............................................................................................................................6
Part-1 ...........................................................................................................................................................11
1. Introduction ..........................................................................................................................................11
2. Standardization and Policy ..................................................................................................................14
2.1. M2M/IOT Globally ........................................................................................................................15
2.1.1. M2M/IOT Policy initiatives....................................................................................................15
2.1.2. M2M/IOT Standardization Activities.....................................................................................18
2.2. M2M/IOT in India .........................................................................................................................31
2.2.1. M2M/IOT Policy Initiatives ...................................................................................................31
2.2.2. M2M Standardization Activities............................................................................................35
3. Various Communication Technologies for M2M/IoT............................................................................41
2.3. Comparison Table for wired and wireless Technologies.................................................................42
4. Role of M2m/IoT in Smart City Mission in India...................................................................................48
5. Conclusion..........................................................................................................................................49
6. Glossary...............................................................................................................................................49
7. Sources................................................................................................................................................52
Part: 2...........................................................................................................................................................54
Section – I: PRIVACY ISSUES IN THE IOT ECOSYSTEM........................................................................55
1. Introduction ..........................................................................................................................................55
2. Stakeholders in a personal information transaction.............................................................................56
3. Laws on privacy and data protection in India .....................................................................................56
2.1 Evolution and Constitutional basis for privacy in India ................................................................57
3.2. Existing legislations relating to the right to privacy, data protection in India ...............................59
3.2.1. Information Technology Act, 2000 .......................................................................................59
3.2.2. Regulations relating to data protection and privacy by telecom service providers and
Internet service providers.....................................................................................................................61
3.2.3. The Indian Telegraph Act, 1885 ..........................................................................................63
3.2.4. TRAI Regulations.................................................................................................................64
3.2.5. Guidelines by the Medical Council of India..........................................................................65
3.2.6. Aadhar Act ...........................................................................................................................66
4. Current general legal principles in relation to data protection and privacy..........................................67
5. Proposed privacy legislation/policy......................................................................................................68
5.1. Report of the Group of Experts on Privacy under Justice A.P Shah...............................................68
3. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
5.2. Privacy Protection Bill, 2013 ............................................................................................................72
5.3. Committee on Data Protection under Justice B.N. Srikrishna.........................................................72
5.3.1. The White Paper on data protection framework..........................................................................72
5.3.2. The Report and the draft Data Protection Bill, 2018....................................................................73
6. The IOT challenge to principles of privacy ..........................................................................................78
7. Case studies ........................................................................................................................................79
7.1. Self-Driving/ Driverless Cars........................................................................................................79
7.2. Fitness Devices/ Wearable technology........................................................................................80
8. Laws on privacy and IOT policy in other jurisdictions..........................................................................80
8.1. Europe..........................................................................................................................................80
8.2. United States of America .............................................................................................................83
8.3. United Kingdom ...........................................................................................................................84
9. Recommendations ...............................................................................................................................85
9.1. Legislative Measures ...................................................................................................................85
9.1.1. Consent, Notice and Collection of data ...............................................................................85
9.1.2. Data Minimization ................................................................................................................86
9.1.3. Legislation on Data Protection.....................................................................................................86
9.2. Industry recommendations...........................................................................................................87
9.2.1. De- Identification of data......................................................................................................87
9.2.2. Adopting privacy by design..................................................................................................87
9.2.3. Consent Dashboards ...........................................................................................................87
9.2.4. Allocation of responsibility & liability ....................................................................................88
9.2.5. Privacy Standards Body.......................................................................................................88
Section-II: OTHER LEGAL ISSUES IN THE IOT ECOSYSTEM ................................................................91
1. Introduction ..........................................................................................................................................91
2. Legal Issues relating to data................................................................................................................91
2.1. Ownership of Data in the IOT Ecosystem ...................................................................................91
2.2. Copyright in Data and Databases................................................................................................92
3. Validity of M2M contracts.....................................................................................................................94
4. Product Liability in the IOT ecosystem ................................................................................................95
4.1. Consumer Protection Act, 1986...................................................................................................95
4.2. Product liability in Tort..................................................................................................................97
4. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
List of Contributors
A. Primary Authors / Drafting Committee
Name Designation Organisation E-mail address
Mr. Dinesh
Chand Sharma
Director Standards
Public Policy
EU Project
SESEI
dinesh.chand.sharma@sesei.eu
Mr. Sheahan
Verghese
Founder & MD
Tree of Life
Associates
sheahan@tlaindia.com
Mr. Vivek
Shiva
Deputy Manager Samsung, India vivek.shiva@samsung.com
Mr. Dhananjay
Sharma
COO SenRA Dhananjay@senraco.com
Mr. Rohit
Rawat
Secretariat TSDSI Required
Mr. Gaurav
Sareen
Country Director India &
SAARC,
Sigfox gaurav.sareen@sigfox.com
Mr. Vijay
Madan
Mentor and Advisor
Services and Solutions
TSDSI vijay.madan@tsdsi.org
B. Contributors (Working Group Standards, Legal & Regulatory – IET IoT Panel)
Name Designation Organisation E-mail address
Mr. Shreyas
Jayasimha
Founder Aarna Law shreyas.jayasimha@aarnalaw.com
Ms. Pamela
Kumar
Director General TSDSI dg@tsdsi.org
Ms. Reena Garg
Head (Electronics &
IT Dept
BIS hlitd@bis.gov.in
Mr. Srikanth
Chandrasekaran
Director, Standards
and Technology
IEEE India sri.chandra@ieee.org
Dr Lovneesh
Chanana
Vice President,
Government
Relations
SAP India l.chanana@sap.com
Mr. Sumit
Monga
Head Government
Affairs
Unlimit Sumit.Monga@relianceada.com
C. Other Supporting Team
Name Designation Organisation E-mail address
Ms. Priya
Sawhney
Mohindru
Project Manager SESEI, India priya.sawhney@sesei.eu
Mr. Nitin
Sharma
Assistant Project
Manager
SESEI, India nitin.sharma@sesei.eu
5. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
D. IET Review Committee
Name Designation Organisation
Shri T. V. Ramachandran Founder & CEO Advisory@TVR
Mr. Shekhar Sanyal Country Head IET
Ms. Anitha Kaveri
Manager – Sector and
Special Projects
IET
Ms. Neha Abhyankar Sector Support Executive IET
6. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
1. Executive Summary
Nowadays, the Internet of Things (IoT) became an advanced technology widely deployed in several
fields including industry, transportation, energy, home and environment monitoring, and healthcare and
wellbeing applications. IoT provides an added value service allowing users to easily supervise their
environments and helping them make suitable decisions. IoT is likely to improve the quality of people's
lives, create new markets and new opportunities, increase economic growth, and be a momentum for
competition. The Internet of Things (IoT) is slowly making the world more agile and functional via M2M
and other protocols. M2M represents a developing field with its own concepts that include sensors,
communications in local-area and wide-area, server on premises, local scanning devices, user-facing
services, and storage and analytics. Additionally, the tech has developed into the mobile environment to
further improve people and machine communication, including in monitoring systems that collect data
and drive decisions. M2M is also having an impact on the telecommunication industry, helping change
how we interact with our devices.
Developing as well as developed countries have announced huge investments in terms of billions and
trillions of Euros for M2M based services. At present more than 450 mobile operators are offering M2M
services across about 200 countries.
As per Deloitte's TMT India Predictions 2017, Internet of Things (IoT) is going to be the next big thing
for operators as India will rapidly grow into a hub for IoT Solutions. The market value of IoT is expected
to reach USD 9 billion by 2020. IoT units in India are also expected to see a rapid growth of 31 times to
reach 1.9 billion by 2020. M2M/IoT has been around for several decades now: Some deployments date
back more to than 20 years. However, M2M/IoT markets are struggling to realise the full M2M market
potential.
IoT comprises M2M as well as Human-to-Machine communication (H2M). The enabling technologies
for Internet of Things are sensor networks, RFID, M2M, mobile Internet, wired & wireless
communication network, semantic data integration, semantic search etc. In wireless communication Wi-
Fi, ZigBee, 6LOPAN, Bluetooth technologies may be used for short range connectivity among devices /
devices to the gateway. Further GSM 2G/ 3G/ LTE/ Wi-Max may be used for connecting M2M gateway
to the desired server.
The IoT ecosystem is heavily dependent on data collection and transmission. Connected sensors
collect large amount of data through the Internet, enabling M2M interaction and processing of the data
for particular services. Different types of data are transmitted and processed within the IoT ecosystem.
The data primarily includes personal data and sensitive personal information such as financial
information, location, health related information, etc.
7. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
Standards and policy are critical elements of IoT and M2M as many devices will be connected.
Standardization is needed in order to deliver the scalability and flexibility the market requires to
maximize the potential of IoT and M2M. Standardization enables improved functionality – cost-quality
trade-offs to be made, which will deliver faster time-to market for new devices and applications.
Prominent telecommunications standards bodies such as 3GPP, ETSI, oneM2M, IEEE, ITU and
ISO/IECJTC1 etc. are involved in providing recommendations and standards in the context of M2M/IoT.
oneM2M while addressing the Common Service Layer Standards released its first set of standards in
January 2015, Release 2 were published in August 2016 and Release 2A deliverables were ratified on
12th March 2018 and is made up of 22 Technical Specifications and 9 Technical Reports.
At the same time, however, the Internet of Things raises significant challenges that could stand in the
way of realizing its potential benefits. Attention-grabbing headlines about the hacking of Internet-
connected devices, surveillance concerns, and privacy fears already have captured public attention.
Technical challenges remain and new policy, legal and development challenges are emerging.
Some key IoT issue areas are examined to explore some of the most pressing challenges and
questions related to the technology. These include standards, legal and regulatory; privacy issues and
securing of Internet of Things.
• Standards, Legal and Regulatory: A fragmented environment of proprietary IoT technical
implementations will inhibit value for users and industry. While full interoperability across products
and services is not always feasible or necessary, purchasers may be hesitant to buy IoT products
and services if there is integration inflexibility and high ownership complexity. In addition, poorly
designed and configured IoT devices may have negative consequences for the networking
resources they connect to and the broader Internet. Appropriate standards, reference models, and
best practices also will help curb the proliferation of devices that may act in disrupted ways to the
Internet. The use of generic, open, and widely available standards as technical building blocks for
IoT devices and services (such as the Internet Protocol) will support greater user benefits,
innovation, and economic opportunity.
There is a strong market case for producing global specifications. M2M offers unprecedented
business opportunities for new devices and services. But if we are to fully exploit these
opportunities and grow the market to the scale projected, we need common global standards to
reduce complexity, facilitate the roll-out of new devices and services, and provide economies of
scale. One such initiative is oneM2M partnership project which has developed specification for
Common Service Layer and are being used by a number of independent open source foundations
and projects, in addition to commercial deployments [OCEAN, IOTDM, OM2M, CDOT, HP etc.] as
the industry looks to accelerate take up of IoT products and platforms.
8. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
The use of IoT devices raises many new regulatory and legal questions as well as amplifies
existing legal issues around the Internet. The questions are wide in scope, and the rapid rate of
change in IoT technology frequently outpaces the ability of the associated policy, legal, and
regulatory structures to adapt. One set of issues surrounds cross border data flows, which occur
when IoT devices collect data about people in one jurisdiction and transmit it to another jurisdiction
with different data protection laws for processing. Further, data collected by IoT devices is
sometimes susceptible to misuse, potentially causing discriminatory outcomes for some users.
Other legal issues with IoT devices include the conflict between law enforcement surveillance and
civil rights; data retention and destruction policies; and legal liability for unintended uses, security
breaches or privacy lapses. While the legal and regulatory challenges are broad and complex in
scope, adopting the guiding Internet Society principles of promoting a user’s ability to connect,
speak, innovate, share, choose, and trust are core considerations for evolving IoT laws and
regulations that enable user rights.
White paper on Standards, Legal and Regulatory work around M2M / IoT as Part 1 to this
report highlights Standards, legal and Regulatory work around M2M/IoT.
• Privacy and other legal Issues: The full potential of the Internet of Things depends on strategies
that respect individual privacy choices across a broad spectrum of expectations. The data streams
and user specificity afforded by IoT devices can unlock incredible and unique value to IoT users
but concerns about privacy and potential harms might hold back full adoption of the Internet of
Things. This means that privacy rights and respect for user privacy expectations are integral to
ensuring user trust and confidence in the Internet, connected devices, and related services.
Indeed, the Internet of Things is redefining the debate about privacy issues, as many
implementations can dramatically change the ways personal data is collected, analyzed, used,
and protected. For example, IoT amplifies concerns about the potential for increased surveillance
and tracking, difficulty in being able to opt out of certain data collection, and the strength of
aggregating IoT data streams to paint detailed digital portraits of users. While these are important
challenges, they are not insurmountable. In order to realize the opportunities, strategies will need
to be developed to respect individual privacy choices across a broad spectrum of expectations,
while still fostering innovation in new technology and services.
Black’s Law Dictionary defines “privacy” as the quality, state or condition of being free from public
attention, intrusion into, or interference with one’s acts or decisions. Black’s Law Dictionary further
defines “informational privacy” as the right to choose to determine whether, what, how and to what
extent information about oneself is communicated to others, especially sensitive and confidential
information. This definition becomes relevant in the context of the IOT ecosystem as informational
privacy and its concepts are being challenged with the evolution of IOT.
9. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
The IOT ecosystem is heavily dependent on data collection and transmission. Connected sensors
collect large amount of data through the Internet, enabling M2M interaction and processing of the
data for particular services. Different types of data are transmitted and processed within the IOT
ecosystem. The data primarily includes personal data and sensitive personal data such as
financial information, location, health related information, etc., that is attributed to an individual. In
this context, it is pertinent to examine how data is treated legally.
Further, M2M interactions contemplate contracts between machines and sensors with minimal
human involvement. In this regard, the validity of such contracts need to be examined. The
traditional concept of product liability (where the manufacturer/ supplier is made liable for any
injuries or loss arising out of defective products) is challenged in the IOT ecosystem, as a typical
IOT transaction chain involves multiple devices with different manufacturers or suppliers. In this
regard, it becomes difficult to precisely ascertain the liability of a particular manufacturer or IOT
service provider.
White paper on “Privacy and Other Legal Issues in the Internet of Things” as Part 2 to this
report highlights the evolution of the right to privacy in India and the existence of the right in the
present legal infrastructure. These existing principles of the right to privacy are then examined in
the context of the IOT environment, in order to assess if they effectively protect the privacy of the
user. This Paper has confined itself to the assessment of B2C interaction in the IOT ecosystem
and does not address B2B networks. Further, the Paper has restricted its detailed examination of
existing legal norms to information technology law and TRAI regulations, since data within the IOT
ecosystem is primarily electronic data. The legal framework for privacy in other jurisdictions and
the steps taken to adopt them for IOT is also analysed to provide a comparative perspective. Part I
then attempts to highlight the gaps that need to be filled and make suggestions in law and policy,
for ensuring and safeguarding privacy in the IOT ecosystem.
Section II of the Part 2 of the report initially examines the jurisprudence of data as property and
has addressed the concept of ownership of data and treatment of data as property. Further, it
goes on to examine the law relating to product liability and validity of machine to machine (“M2M”)
contracts in the IOT ecosystem. In this regard, the legislations surrounding product liability such as
the Consumer Protection Act, 1986 and the law of torts on product liability have been examined.
Further, the provisions of the Indian Contract Act, 1872 and the Information Technology Act, 2000
have been analyzed to gauge potential legal issues in the validity of M2M contracts.
• Security: While security considerations are not new in the context of information technology, the
attributes of many IoT implementations present new and unique security challenges. Addressing
these challenges and ensuring security in IoT products and services must be a fundamental
10. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
priority. Users need to trust that IoT devices and related data services are secure from
vulnerabilities, especially as this technology become more pervasive and integrated into our daily
lives. Poorly secured IoT devices and services can serve as potential entry points for cyber-attack
and expose user data to theft by leaving data streams inadequately protected. The interconnected
nature of IoT devices means that every poorly secured device that is connected online potentially
affects the security and resilience of the Internet globally. This challenge is amplified by other
considerations like the mass-scale deployment of homogenous IoT devices, the ability of some
devices to automatically connect to other devices, and the likelihood of fielding these devices in
unsecure environments. As a matter of principle, developers and users of IoT devices and
systems have a collective obligation to ensure they do not expose users and the Internet itself to
potential harm. Accordingly, a collaborative approach to security will be needed to develop
effective and appropriate solutions to IoT security challenges that are well suited to the scale and
complexity of the issues.
Fortunately, IoT security can be covered with four cornerstones:
o Protecting Communications
o Protecting Devices,
o Managing Devices, and
o Understanding Your System
These cornerstones can be combined to form powerful and easy-to-deploy foundations of security
architectures to mitigate the vast majority of security threats to the Internet of Things, including
advanced and sophisticated threats.
11. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
Part-1
Standards, Legal and Regulatory work around M2M / IoT
1. Introduction
Machine-to-machine (M2M) communications is used for automated data transmission and
measurement between mechanical or electronic devices. The key components of an M2M system are:
Field-deployed wireless devices with embedded sensors or RFID-Wireless communication networks
with complementary wireline access includes, but is not limited to cellular communication, Wi-Fi,
ZigBee, WiMAX, Low Power Wide Area Networks (LoRaWAN,Sigfox,NB-IoT) ,wireless LAN (WLAN),
generic DSL (xDSL) and fiber to the x (FTTx).
The Internet of Things (IoT) refers to the ever-growing network of physical objects that feature an IP
address for internet connectivity, and the communication that occurs between these objects and other
Internet-enabled devices and systems.
Most industry analysts acknowledge the Internet of Things and Machine-to-Machine as unprecedented
opportunities for creating and commercializing new devices and applications. IoT and M2M will also
change the way we live and work through new and innovative services. There is no doubt that within a
few years, there will be a vast increase in the number of connected devices. Internet of Things will be at
the top of emerging technologies and anticipates a five-to-ten-year period for the market to reach full
maturity.
As per Deloitte's TMT India Predictions 2017, Internet of Things (IoT) is going to be the next big thing
for operators as India will rapidly grow into a hub for IoT Solutions. The market value of IoT is expected
to reach USD 9 billion by 2020. IoT units in India are also expected to see a rapid growth of 31 times to
reach 1.9 billion by 2020.
M2M/IoT has been around for several decades now: Some deployments date back more to than 20
years. However, M2M/IoT markets are struggling to realise the full M2M market potential. Estimates
indicate IoT is a Trillion Dollar Opportunity having unlimited possibilities. Some of the latest forecasts
and predictions by analysts are;
12. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
• The worldwide Internet of Things (IoT) market is expected to grow 19% in 2015, led by digital
signage, according to a new forecast from International Data Corporation (IDC). The second
annual forecast focuses on growing IoT use in 11 vertical industries, including consumer, retail,
healthcare, government, manufacturing, transportation, and other industries, while also sizing IoT
opportunities for 25 vertical-specific use cases. Few of the recent publication are highlights below:
• ITU estimates the market for IoT devices will result in over USD 1.7 trillion in value added to
the global economy by 2019.
• Research Nester: The Global Internet of Things (IoT) market reached USD 598.2 Billion in
2015 and the market is expected to reach USD 724.2 Billion by 2023. Further, the market is
projected to register a CAGR of 13.2% during the forecast period 2016-2023 globally.
The market of Asia-Pacific region acquired 36% of the global revenue share in 2015 and the
market is anticipated to grow at a CAGR of 10.2% during the forecast period i.e. 2016-2023.
• Juniper: The number of connected IoT (Internet of Things) devices, sensors and actuators
will reach over 46 billion in 2021.
• Markets and Markets: Iot technology market is expected to grow from USD 130.33 Billion in
2015 to USD 883.55 Billion by 2022, at a CAGR of 32.4% between 2016 and 2022.
• Machine Research: - The total number of IoT connections will grow from 6 billion in 2015 to
27 billion in 2025, a CAGR of 16%.
• Cisco: Over the next five years, global IP networks will support up to 10 billion new devices
and connections, increasing from 16.3 billion in 2015 to 26.3 billion by 2020. There are
projected to be 3.4 devices and connections per capita by 2020—up from 2.2 per capita in
2015. Globally, M2M connections are calculated to grow nearly three-fold from 4.9 billion in
2015 to 12.2 billion by 2020, representing nearly half (46 percent) of Total connected
devices.
• Grand view research: The global Internet of Things (IoT) market size was valued at USD
605.69 billion in 2014. Technological proliferation and increasing investments are expected to
drive the global market over the next seven years.
• Gartner: Gartner, Inc. forecasts that 6.4 billion connected things will be in use worldwide in
2016, up 30 percent from 2015, and will reach 20.8 billion by 2020. In 2016, 5.5 million new
13. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
things will get connected every day. Gartner estimates that 4 billion connected things will be
in use in the consumer sector in 2016, and will reach 13.5 billion in 2020.
• IDC: According to IDC, global IoT spending will experience a compound annual growth rate
(CAGR) of 15.6% over the 2015-2020 forecast period, reaching $1.29 trillion in 2020.
• Global research organisation Software: As many as 50 billion devices, ranging from
smartphones and TVs to watches, pipelines and trucks, will be connected by IoT by 2020.
While IOT/M2M/IOE is a huge topic ranging from last mile connectivity all the way to data models and
semantics, one cannot expect the work to focus in a single place. The following list contain few
examples and many more exist:
• Alljoyn – open source project
• IEEE P2413—Standard for an Architectural Framework for the Internet of Things, IETF, ISA 100
(Industrial IOT)
• ISO/IEC JTC1 /WG7: project named IOT RA covering Sensor Network Reference Architecture
• ITU Y 2066 and Y2067: Recommendation about IOT covering Requirements and Gateway
capabilities
• Open-Interconnect, ZigBee, Z-Wave (wireless protocol for home automation) etc.
• ETSI / oneM2M
• LoRa Alliance: 500 plus companies globally in not for profit alliance to develop and standardize
LoRaWAN, Notable members are Cisco, Google Cloud, Comcast, Senet, Softbank, Alibaba, KPN,
Orange, SKT, SenRa, Tencent
Key challenges:
• Fragmentation, provisioning/efficiency, integration complexity, scalability
• M2M Communications meets non-ICT Industry [Automotive, Health, Energy]
• How to make intelligent use of information, enabled by connected IT [Cloud]
Market projections for the growth of Machine-to-Machine (M2M) communications and the Internet of
Things (loT) are unrealistic without the emergence of a global standardized platform. In short, this
industry will not take off without significant consolidation and the economies of scale that
standardization can bring. Hence Standardization is needed in order to deliver the scalability and
flexibility the market requires to maximize the full potential of loT and M2M.
14. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
2. Standardization and Policy
Standards and policy are critical elements of IoT and M2M as many devices will be connected
Standardization is needed in order to deliver the scalability and flexibility the market requires to
maximize the potential of IoT and M2M. Standardization enables improved functionality – cost-quality
trade-offs to be made, which will deliver faster time-to market for new devices and applications. A
dramatic change within short period of time is mainly attributed to development of ICT and Internet. It is
expected that future ICT developments will mainly ride on M2M and IoT. The number of worldwide M2M
connections is growing exponentially, with some forecasts as high as 50 billion by 2020. These
connections will reside within virtually every major market category – from healthcare to transportation
and energy to agriculture. Also, huge investments in terms of billions and trillions for M2M based
services have been announced by developing and developed countries. At present 468 mobile
operators are offering M2M services across 190 countries.
All kinds of M2M services can be efficiently and economically made available to consumers if they are
configured on common communication network which is open, scalable and standards based. However
different kinds of M2M services have varying network requirements broadly categorized as under:
➢ Very low Bandwidth < 1Mbps (Monthly usage 10kb to 10Mb) e.g. Remote sensors
➢ Low Bandwidth < 1kbps to 10kbps (Monthly usage 1mb to 10mb) e.g. utility, health security
monitoring
➢ Medium Bandwidth < 50kbps to few MB (Monthly usage 10mb to 300mb) e.g. retail, ticketing,
inventory control, gaming, digital picture frames.
➢ High Bandwidth, in Mbps (monthly usage > 300mb to 90Gb) e.g. digital signage, video
surveillance.
Keeping all these facts under consideration, the need of having a global Partnership in developing
standards for Machine-to-Machine (M2M) communications and the Internet-of-Things (IoT) was strongly
felt.
15. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
2.1. M2M/IOT Globally
2.1.1. M2M/IOT Policy initiatives
Favorable regulations and government supports are other important aspect that needs to be taken care
by various governments and associations to harness full potential of M2M. In various countries, a
number of government supported M2M projects are announced, however regulations around M2M are
announced in bits and pieces. Till date, full-fledged regulations on M2M are not seen in any country.
Action in this direction has started in some countries and consultation papers have come out.
GSMA (Groupe Speciale Mobile Association) has issued guidelines for IoT/ M2M market that outline
how devices and applications should communicate via mobile networks. The guidelines include a
number of best practice areas such as data aggregation within devices, non-synchronous network
access, application scalability and guidance on how to manage signaling traffic from de-activated or
out-of-subscription SIMs. GSMA is also undertaking a project to develop a common set of acceptance
tests for IoT/ M2M devices and applications to ensure best practices are being followed. The project will
establish a single, standard set of connection efficiency tests for IoT/ M2M devices and applications,
enabling players across the industry to develop and deploy IoT/ M2M services with confidence.
Legislation and Policy Document at European level:
- Com (2016) 176: ICT Standardization priority for digital single market:
To support Europe’s role in the global digital economy, the European Commission has adopted a
communication on a Digital Single Market strategy and has made it one of its key priorities. Common
standards ensure the interoperability of digital technologies and are the foundation of an effective
Digital Single Market. They guarantee that technologies work smoothly and reliably together, provide
economies of scale, foster research and innovation and keep markets open. To address the challenges
related to ICT standardisation, the Commission announced that it would “launch an integrated
standardisation plan to identify and define key priorities for standardisation with a focus on the
technologies and domains that are deemed to be critical to the Digital Single Market”.
- Com (2016) 180: Digitising European Industry reaping the full benefits og Digital single market.
Digitisation provides a unique opportunity for attracting further investments into innovative and high
growth digital and digitised industries in Europe. Industry in the EU can build on its strengths in
16. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
professional digital technologies and on its strong presence in traditional sectors to seize the wide
range of opportunities that IoT, big data and AI-based systems offer and capture a share of the
emerging markets of future products and services.
While adapting to the digital industrial change is primarily a matter for business, a targeted public policy
can play an important part in creating the best conditions for that to happen in all sectors in a
competitive environment bolstered by the competition rules. This is particularly important for the vast
number of small and medium-sized enterprises that underpin the European economy. Public policy
should aim at a thriving digital sector fueling the digitisation of the whole industrial fabric, from
construction, health and agro-food to creative industries.
The purpose of this Communication is therefore to reinforce the EU's competitiveness in digital
technologies and to ensure that every industry in Europe, in whichever sector, wherever situated, and
no matter of what size can fully benefit from digital innovations.
- SWD (2016) 110/2: Advancing the Internet of things in Europe
The Internet of Things (IoT) represents the next major economic and societal innovation wave enabled
by the Internet. With the IoT, any physical (e.g. a thermostat or a bike helmet) and virtual (i.e. a
representation of real object in a computer system) object can be connected to other objects and to the
Internet, creating a fabric between things as well as between humans and things. The IoT can combine
the physical and the virtual worlds into a new smart environment, which senses, analyses and adapts,
and which can make our lives easier, safer, more efficient and more user-friendly. The Digital Single
Market Strategy for Europe (in short DSM Strategy) underlines the need to avoid fragmentation and to
foster interoperability for the IoT to reach its potential.
- Com (2009) 278: “Internet of Things — An action plan for Europe”: Standardization will play an
important role in the uptake of IoT, by lowering entry barriers to newcomers and operating costs for
users, by being a prerequisite for interoperability and economies of scale and by allowing industry to
better compete at international level. IoT standardization should aim at rationalizing some existing
standards or developing new ones where needed.
-BEREC BoR (16)39, Report on enabling the Internet of Things:
17. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
In view of the Digital Single Market (DSM) review, BEREC considers that, in general, no special
treatment of IoT services and/or M2M communication is necessary, except for the following areas:
• Roaming;
• Switching;
• Number portability.
With regard to privacy, BEREC sees the need for a careful evolution – but not an entire overhaul – of
the existing EU data protection rules. This assessment does not preclude that within the DSM review
further areas for amendments of the regulatory framework taking into account the peculiarities of IoT
services and/or M2M communication might be identified. No need for a European numbering scheme
for M2M communication has been identified.
-LoRa Alliance
Dedicated Regulatory Task Force is now fully operational and dedicated to closely monitoring decisive
discussions in the European Conference of Postal and Telecommunications Administrations (CEPT)
and European Telecommunications standards Institute (ETSI):
• CEPT (SE24): Compatibility studies between SRD operated at 500 mW at 916.3 MHz and Mobile
operated below 915 MHz. Additional studies in the frequency range 865-868 MHz are expected to
be conducted between September and December 2018
• CEPT (SRD/MG): Discussions relating to spectrum for 500 mW operating systems
• ETSI (TG28): Ongoing discussions relating to the standardization process with a possible decision
on the approach in August 2018
Decision has been taken to harmonize the SRD spectrum use in the 874-876 and 915-921 MHz bands
in the European Union, which will ensure further unlicensed-spectrum possibilities for the LoRaWAN™
products and services to operate.
18. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
2.1.2. M2M/IOT Standardization Activities
There are various standards development sub-activities taking place at the level of individual TSDO
listed as under:
➢ European Telecommunications Standards Institute (ETSI) M2M: ETSI Technical Committee is
developing standards for M2M communications. The group aims to provide an end-to-end view of
M2M standardization.
ETSI is addressing the issues raised by connecting potentially billions of smart objects into a
communications network, by developing standards for:
• Data Security
• Data Management
• Data Transport
• Data Processing
This will ensure interoperable and cost-effective solutions, open up opportunities in new areas
such as e-Health and smart metering, and allow the market to reach its full potential. Machine-to-
Machine (M2M) communications will form the foundation for:
• Smart Devices
• Smart Appliances
• Smart Home
• Smart Building
• Smart Cities
http://www.etsi.org/technologies-clusters/clusters/connecting-things
19. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
The following is a list of the latest published ETSI standards on internet of things.
Standard No. Standard title.
TR 103 526
System Reference document (SRdoc); Technical characteristics for Low
Power Wide Area Networks Chirp Spread Spectrum (LPWAN-CSS)
operating in the UHF spectrum below 1 GHz
TR 103 515
Digital Enhanced Cordless Telecommunications (DECT); Study on URLLC
use cases of vertical industries for DECT evolution and DECT-2020
GR NGP 004
Next Generation Protocol (NGP); Evolved Architecture for mobility using
Identity Oriented Networks
TS 118 132
MAF and MEF Interface Specification (oneM2M TS-0032 version 2.0.2
Release 2A)
TR 103 422
Digital Enhanced Cordless Telecommunications (DECT); DECT evolution
technical study; Requirements and technical analysis for the further evolution
of DECT and DECT ULE
GR IP6 008 IPv6-based Internet of Things Deployment of IPv6-based Internet of Things
GR IP6 001 IPv6 Deployment in the Enterprise
TS 118 122
oneM2M Field Device Configuration (oneM2M TS-0022 version 2.0.0
Release 2)
GS NGP 001 Next Generation Protocol (NGP); Scenario Definitions
GS NGP 005 Next Generation Protocol (NGP); Next Generation Protocol Requirements
TS 103 268-1
SmartM2M; Smart Appliances Ontology and Communication Framework
Testing; Part 1: Testing methodology
TS 103 268-2
SmartM2M; Smart Appliances Ontology and Communication Framework
Testing; Part 2: Protocol Implementation Conformance Statement (PICS) pro
forma
TS 103 268-3
SmartM2M; Smart Appliances Ontology and Communication Framework
Testing; Part 3: Test Suite Structure and Test Purposes (TSS & TP)
20. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
TS 103 268-4
SmartM2M; Smart Appliances Ontology and Communication Framework
Testing; Part 4: Abstract Test Suite (ATS) and Protocol Implementation eXtra
Information for Testing (PIXIT)
TS 103 264 SmartM2M; Smart Appliances; Reference Ontology and oneM2M Mapping
TR 103 435
System Reference document (SRdoc); Short Range Devices (SRD);
Technical characteristics for Ultra Narrow Band (UNB) SRDs operating in the
UHF spectrum below 1 GHz
TR 103 411 SmartM2M; Smart Appliances; SAREF extension investigation
TS 103 410-1 SmartM2M; Smart Appliances Extension to SAREF; Part 1: Energy Domain
TS 103 410-2
SmartM2M; Smart Appliances Extension to SAREF; Part 2: Environment
Domain
TS 103 410-3 SmartM2M; Smart Appliances Extension to SAREF; Part 3: Building Domain
A full list of related standards in the public domain is accessible via the ETSI standards search.
Via this interface you can also subscribe for alerts on updates of ETSI standards.
For work in progress see the ETSI Work Programme on the Portal.
In 2016 the European Telecommunications Standards Institute (ETSI) specialist task Force 505
(STF 505) published two technical reports covering IoT standards given below:
• ETSI TR 103375, SmartM2M; IoT Standards landscape and future
The scope of the present document is to provide an overview of the IoT standards landscape:
requirements, architecture, protocols, tests, etc. to provide the roadmaps of the IoT
standards, when they are available.
The essential objectives are:
o To analyse the status of current IoT standardisation.
o To assess the degree of industry and vertical market fragmentation.
21. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
o To point towards actions that can increase the effectiveness of IoT standardisation, to
improve interoperability, and to allow for the building of IoT ecosystems.
• ETSI TR 103376, SmartM2M; IoT LSP use cases and standards gaps
Starting from the use case families selected for the IoT Large Scale Pilots (LSPs) the present
technical report aim is:
o To provide the collection of all missing functionalities that have been identified in
standards bodies (SDOs) to offer solutions addressing the use case requirements.
o To check that there are no omissions in the standardization activity with regard to the
use cases. In particular, gaps with respect to the framework as identified by oneM2M
should be identified.
o To propose some recommendations to overcome potential gaps. Particular attention will
be paid on horizontal application layer standardization and to assure an interworking
framework among different vertical industrial segments.
➢ 3rd
Generation Partnership Project (3GPP): Apart from ETSI, 3GPP is also focusing work on
three LPWA technologies: Extended Coverage GSM Internet of Things (EC-GSM-IoT), LTE for
Machine-Type Communications (LTE-M) and Narrowband Internet of Things (NB-IoT) which are
getting rolled out now. Each has been standardized to ensure that increasingly diverse device and
application types are supported by 3GPP networks, around the world.
The common high-level objectives for all three technologies are to:
• Decrease user equipment (UE) complexity and thus cost
• Decrease power consumption
• Increase coverage (about 15-20dB improvement)
In addition, 3GPP defined more specific objectives for EC-GSM-IoT and NB-IoT to meet the
following objectives:
• Provide a data rate of at least 160 bps at 20 dB coverage extension beyond GPRS.
• Scale to support a massive number of MTC mobile stations (more than 50k per cell).
• Support a ten-year battery life with battery capacity of five watt-hours.
• Lower network complexity. Avoid negative impacts to legacy GSM/ WCDMA/LTE system(s)
and adhere to regulatory spectrum requirements.
22. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
• Minimise impacts on the GPRS/EDGE base station hardware. Identify core network
architecture, security framework and radio access network-core network interface (e.g. S1 or
Gb), and associated protocol stacks.
• Restrict use to a simple QoS model.
• There is no requirement for inter-RAT mobility, as it would increase the complexity and,
therefore, the cost of the device.
➢ Open Connectivity Foundation (OCF): OCF, a leading Internet of Things (IoT) standards body
is dedicated to ensuring secure interoperability for consumers, businesses and industries by
delivering a standard communications platform, a bridging specification, an open source
implementation and a certification program allowing connected devices (phones, computers and
sensors) to communicate with one another regardless of manufacturer, operating system, chipset,
or physical transport.
OCF being one of the most active SDO in the IoT domain, its activities are designed to enumerate
“security schemes, compliance standards, interoperability guidelines” for both consumers and
enterprises. OCF strives to drive both functional and interoperability standards, for communication
protocols and establish certification guidelines for IoT infrastructure and devices.
OFC has initiated the IoTivity Project- an open source software framework enabling seamless
device-to-device connectivity to address emerging needs of the IoT by delivering a reference
implementation of IoT interoperability specifications. The architectural goal of IoTivity is “to
interconnect both wired and wireless devices, with the Internet to ensure a protectable and
resilient architecture for smart/lightweight devices”.
OCF's Mission is Twofold:
1. Provide specifications, code and a certification program to enable manufacturers to bring
OCF Certified products to the market that can interoperate with current IoT devices and
legacy systems.
2. Make the end user’s experience better by seamlessly bridging to other ecosystems within a
user’s smart home and ensure interoperability with OCF compliant devices.
OCF's Specifications leverage existing industry standards and technologies, provides connection
mechanisms between devices and between devices and the cloud, and manages the flow of
information among devices, regardless of their form factors, operating systems, service providers
or transports.
23. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
OCF Provides Manufacturers and Developers With:
• A framework for secure interoperability for multiple OSs, platforms, modes of communication,
transports and use cases.
• OCF Bridging Specification for discovery and connectivity into other ecosystems.
• OCF Security Framework and identification mechanisms.
• Opportunity for innovation, product differentiation and faster time to market.
OCF Certified Products Provide End Users With:
• A choice of products that aren’t dependent on one particular brand to all work together.
• Products that just work, and security that is counted on.
• The ability to create a customized experience.
• An Internet of Things experience that improves everyday life.
OCF has dedicated work groups & task groups which drive focused objectives from implementing
the technical IoT standard specifications to bringing on-board non-members & liaising with other
standard bodies through ecosystem development. Few prominent ones include – Core
Technology Work Group, Marketing Communications Work Group, and Certification Work Group
etc.
OCF recently released its 2.0 specification which highlights the Cloud infra standardisation
enabling remote access of home devices. Other important updates include CoAP over TCP or TLS
for interacting with resources, design pattern that treats a set of resources as a single addressable
(atomic) unit, Simplified Access Control List for easier access control configuration etc. Read more
➢ IEEE: IEEE has a number of existing standards, projects in development, activities, and events
that are directly related to creating the environment needed for a vibrant IoT, recognising the
value of the IoT to industry and the benefits this technology innovation brings to the public.
(https://standards.ieee.org/)
• IEEE P2413 - Standard for an Architectural Framework for the Internet of Things
This standard defines an architectural framework for the Internet of Things (IoT), including
descriptions of various IoT domains, definitions of IoT domain abstractions, and identification
of commonalities between different IoT domains. Read more
24. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
• IEEE P2418 Standard for the framework of Blockchain use of Internet of Things
The purpose of this project is to develop definitions and a protocol for blockchain
implementations within an IoT architectural framework. This standard provides a common
framework for blockchain usage, implementation, and interaction in Internet of Things (IoT)
applications. The framework addresses scalability, security and privacy challenges with
regard to blockchain in IoT. Blockchain tokens, smart contracts, transaction, asset,
credentialed network, permissioned IoT blockchain, and permission-less IoT blockchain are
included in the framework. Read more
• IEEE P1451-99-Standard for harmonization of Internet of things Devices and Systems
The purpose of this standard is to define a metadata bridge to facilitate IoT protocol transport
for sensors, actuators, and devices. The standard addresses issues of security, scalability,
and interoperability. This standard can provide significant cost savings and reduce complexity
and offer a data sharing approach leveraging current instrumentation and devices used in
industry. This standard defines a method for data sharing, interoperability, and security of
messages over a network, where sensors, actuators and other devices can interoperate,
regardless of underlying communication technology. Read More
• P1451.7 - Smart transducer interface for sensors and actuators - Transducers to radio
frequency identification (RFID) systems communication protocols and Transducer Electronic
Data Sheets (TEDS) for Internet of Things
This standard defines communication methods and data formats for transducers (sensors
and actuators) communicating with Radio Frequency IDentification (RFID) tags and systems,
including the use of a Jabber ID with integral transducers. Read more
• IEEE P1931.1 standard for an Architectural Framework for Real Time Onsite Operations
Facilitation (ROOF) for Internet of things
This standard defines ROOF computing and networking for technical and functional
interoperability for IoT systems that operate and co-operate in a secure and independent
manner within the context of a local environment such as home, factory, office or airport, etc.
This standard defines an architectural framework, protocols and Application Programming
Interfaces (APIs) for providing Real-time Onsite Operations Facilitation (ROOF). ROOF
computing and networking for the data and the devices include next-hop connectivity for the
25. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
devices, real-time context building and decision triggers, efficient backhaul connectivity to the
cloud, and security & privacy. Read More
• IEEE 2510 - Standard for Establishing Quality of Data Sensor Parameters in the Internet of
Things Environment
This standard defines quality measures, controls, parameters and definitions for sensor data
related to Internet of Things (IoT) implementations.
• IEEE SA - 1901.3 - Standard for Power Line Communications for Internet of Things
Applications
This standard specifies Physical (PHY) and Media Access Control (MAC) layers of a
broadband powerline communication technology for Internet of Things applications (IoTPLC)
based on wavelet Orthogonal Frequency Division Multiplexing (wavelet OFDM). This
standard defines modes for operations in different channels (frequency bands) with different
values of carrier spacing. IoTPLC can be used for wired communications via any type of
physical medium such as but not limited to electric power lines and coaxial cables. This
standard uses transmission frequencies below 100 MHz. This standard addresses the
necessary security questions to ensure the privacy of communications between users and
allow the use of IoTPLC for security sensitive services. One communication channel defined
in this standard interoperates with IEEE 1901. For other channels this standard coexists with
IEEE 1901 using IEEE 1901 Inter-System Protocol (ISP) and 1901.2. Read more
• IEEE SA - 2668 - Standard for Maturity Index of Internet-of-things: Evaluation, Grading and
Ranking
This standard provides an objective, unique, transparent, and trustworthy measurement and
indication of IoT objects pertinent to their performances. IDex consists of five levels and
grades and classifies IoT objects and provides a quantitative and trustworthy value to users
and consumers who may then make decision on the usage, adoption and promotion of IoT
objects. The establishment of IDex shall proliferate a rapid, positive and mature progress of
IoT industry. Read more
A partial list of standards related to the Internet of Things is available here
(https://standards.ieee.org/initiatives/iot/stds.html)
26. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
➢ The Internet Engineering Task Force (IETF) ROLL: IETF has created a set of activities related
to sensor technologies and smart objects such as 6LoWPAN and ROLL (routing over low-power
and lossy networks). These efforts are aiming at bringing the Internet Protocol to sensors and
M2M devices needed for building a monitoring infrastructure for Smart Grid. Working Group
ROLL is focusing on RPL (routing protocol for LLNs) for low-power and lossy networks (LLNs)
where the nodes in the networks are many embedded devices with limited power, memory, and
processing resources. The emphasis of the work is on providing an end-to-end IP-based solution
in order to avoid the non-interoperable networks problem. (https://www.ietf.org/)
➢ International Telecommunication Union (ITU): International Telecommunication Union has
established various Focus Groups with the objective of developing recommendations from
telecom/ ICT perspective. There are various focus groups in ITU developing recommendation
relevant to M2M e.g. Focus Group on Smart Sustainable Cities(FG SSC); Focus Group on Smart
Water Management(FGSWM); Focus Group on Disaster Relief Systems, Network Resilience and
Recovery (FG-DR&NRR); Focus Group on Smart Cable Television (FG Smart Cable);Focus
Group on M2M Service Layer (FG M2M); Focus Group “From/In/To Cars Communication” (FG
Car Com);Focus Group on Smart Grid (FG Smart); Focus Group on Cloud Computing (FG
Cloud)etc. (https://www.itu.int/en/Pages/default.aspx)
Standardization work is carried out by the technical Study Groups (SGs) in which representatives
of the ITU-T membership develop Recommendations (standards) for the various fields of
international telecommunications.
✓ SG2 - Operational aspects
SG2 at a Glance
✓ SG3 - Economic and policy issues
SG3 at a Glance
✓ SG5 - Environment and circular economy
SG5 at a Glance
✓ SG9 - Broadband cable and TV
SG9 at a Glance
✓ SG11 - Protocols and test specifications
SG11 at a Glance
✓ SG12 - Performance, QoS and QoE
SG12 at a Glance
✓ SG13 - Future networks (& cloud)
SG13 at a Glance
27. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
✓ SG15 - Transport, access and home
SG15 at a Glance
✓ SG16 - Multimedia
SG16 at a Glance
✓ SG17 - Security
SG17 at a Glance
✓ SG20 - IoT, smart cities &communities
SG20 at a Glance
Study Group 20 is working to address the standardization requirements of Internet of Things (IoT)
technologies, with an initial focus on IoT applications in smart cities and communities (SC&C).
SG20 develops international standards to enable the coordinated development of IoT
technologies, including machine-to-machine communications and ubiquitous sensor networks. An
important aspect of SG20's work is the development of standards that leverage IoT technologies
to address urban-development challenges.
➢ Advancing open standards for the information society (OASIS): OASIS is a non-profit
consortium that drives the development, convergence and adoption of open standards for the
global information society. OASIS promotes industry consensus and produces worldwide
standards for security, Internet of Things, cloud computing, energy, content technologies,
emergency management, and other areas. OASIS open standards offer the potential to lower
cost, stimulate innovation, grow global markets, and protect the right of free choice of technology.
(https://www.oasis-open.org/org)
OASIS Committee Categories: IoT/M2M
Technical Committees:
• OASIS Advanced Message Queuing Protocol (AMQP) Bindings and Mappings (AMQP-
BINDMAP) TC
The OASIS Advanced Message Queuing Protocol (AMQP) Bindings and Mappings (AMQP-
BINDMAP) Technical Committee works closely with the AMQP TC to advance a wire-level
messaging protocol that offers organizations an efficient, reliable approach to passing real-
time data and business transactions. AMQP provides a platform-agnostic method for
ensuring information is safely transported between applications, among organizations, within
mobile infrastructures, and across the Cloud. Read more
28. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
• OASIS Advanced Message Queuing Protocol (AMQP) TC
The OASIS Advanced Message Queuing Protocol (AMQP) Bindings and Mappings (AMQP-
BINDMAP) Technical Committee works closely with the AMQP TC to advance a wire-level
messaging protocol that offers organizations an efficient, reliable approach to passing real-
time data and business transactions. AMQP provides a platform-agnostic method for
ensuring information is safely transported between applications, among organizations, within
mobile infrastructures, and across the Cloud. Read more
• OASIS Classification of Everyday Living (COEL) TC
The OASIS Classification of Everyday Living (COEL) TC has been approved as an OASIS
Committee Specification. The OASIS COEL specification provides a privacy-by-design
framework for the collection and processing of behavioural data. It is uniquely suited to the
transparent use of dynamic data for personalised digital services, IoT applications where
devices are collecting information about identifiable individuals and the coding of behavioural
data in identity solutions. Read more
• OASIS Message Queuing Telemetry Transport (MQTT) TC
Providing a lightweight publish/subscribe reliable messaging transport protocol suitable for
communication in M2M/IoT contexts where a small code footprint is required and/or network
bandwidth is at a premium. Read more
• OASIS Open Building Information Exchange (oBIX) TC
The purpose of oBIX (open Building Information Exchange) is to enable mechanical and
electrical control systems in buildings to communicate with enterprise applications. Read
more
➢ World Wide WEB Consortium (W3C): W3C has recently launched the Web of Things Working
Group to develop initial standards for the Web of Things, tasked with the goal to counter the
fragmentation of the IoT; reduce the costs of development; lessen the risks to both investors and
customers; and encourage exponential growth in the market for IoT devices and services.
(https://www.w3.org/WoT/)
29. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
➢ Open Geospatial Consortium (OGC): The Open Geospatial Consortium (OGC) is an
international not for profit organization committed to making quality open standards for the global
geospatial community. OGC defines and maintains standards for location-based, spatio-temporal
data and services. Some of the work is related to IoT, e.g. a modular suite of standards for web
services allowing ingestion, extraction, fusion, and (with the web coverage processing service
(WCPS) component standard) analytics of massive spatio-temporal data like satellite and climate
archives. (http://www.opengeospatial.org/)
➢ ISO/IEC JTC 1: ISO/IEC JTC 1 WG 10 (Internet of Things): developing ISO/IEC 30141 — IoT
reference architecture.
WG 10 work is ongoing on the following work areas:
• Terms and definitions for JTC 1 IoT Vocabulary (ISO/IEC 20924).
• IoT reference architecture which is flexible and easily extended to various types of
applications (ISO/IEC 30141).
• Support for interoperability of IoT systems in terms of framework, networking, syntactic and
sematic interoperability (ISO/IEC 21823-1).
Diverse use-cases covered by IoT:
• Monitoring the ongoing regulatory, market, business and technology IoT requirements
• IoT standards that build on the foundational standards in relevant JTC 1 subgroups
Documents from JTC 1/WG 10 can be found here:
https://jtc1historyblog.wordpress.com/isoiec-jtc-1-working-groups/wg-10-internet-of-things/
ISO/IEC JTC 1 released preliminary report on Internet of Things (IoT) can be found here:
https://www.iso.org/files/live/sites/isoorg/files/developing_standards/docs/en/internet_of_things_re
port-jtc1.pdf
➢ oneM2M: "The purpose and goal of oneM2M is to develop technical specifications which address
the need for a common M2M Service Layer that can be readily embedded within various hardware
30. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
and software and relied upon to connect the myriad of devices in the field with M2M application
servers worldwide."
oneM2M Release 2A deliverables were ratified by the oneM2M Technical Plenary (comprising 22
specifications and 9 technical reports) on 12th March 2018 during TP34 in Dallas, USA. oneM2M
has published its Release 2 in August 2016. The first oneM2M release includes specifications
covering requirements, architecture, protocols, security, and management, abstraction and
semantics and Release 2 added new functionality, particularly by expanding management,
abstraction and semantics. Release 2 published in August and freely available at www.
oneM2M.org It is made up of 17 Technical Specifications and 9 Technical Reports. In ETSI
SmartM2M, cooperation with AIOTI is foreseen to support 2017-2020 H202 IoT LSP on (semantic)
interoperability, cross sector shared IoT reference architecture (high level architecture), security
and privacy. One M2M is the alliance of the following major ICT SDOs:
o Association of Radio Industries and Businesses (ARIB) of Japan
o Telecommunication Technology Committee (TTC) of Japan
o Alliance for Telecommunications Industry Solutions (ATIS) of USA
o Telecommunications Industry Association (TIA) of the USA
o China Communications Standards Association (CCSA) of Chine
o Telecom Standards Development Society, India (TSDSI)
o European Telecommunications Standards Institute (ETSI) of Europe
o Telecommunications Technology Association (TTA) of Korea
Other forums/organizations:
o BBF (Broadband Forum)
o Continua
o Global Platform
o HGI (Home Gateway Initiative)
o The New Generation M2M Consortium – Japan
o OMA (Open Mobile Alliance) and over 200 member organizations.
For more information please click here
31. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
2.2. M2M/IOT in India
2.2.1. M2M/IOT Policy Initiatives
• National Digital Communications Policy 2018:
On 1 May 2018, the Department of Telecommunications (DoT) released the much-awaited Draft
National Digital Communications Policy – 2018 for public comments. National Digital Communication
policy seeks to unlock the transformative power of digital communications networks - to achieve the
goal of digital empowerment and well-being of the people of India; and towards this end, attempts to
outline a set of goals, initiatives, strategies and intended policy outcomes.
The National Communications Policy aims to accomplish the following Strategic Objectives by
2022:
I. Provisioning of Broadband for All
II. Creating 4 Million additional jobs in the Digital Communications sector
III. Enhancing the contribution of the Digital Communications sector to 8% of India’s GDP from ~ 6%
in 2017
IV. Propelling India to the Top 50 Nations in the ICT Development Index of ITU from 134 in 2017
V. Enhancing India’s contribution to Global Value Chains
VI. Ensuring Digital Sovereignty
Missions:
In pursuit of accomplishing these objectives by year 2022, the National Digital Communications Policy,
2018 envisages three Missions:
✓ Connect India: Creating Robust Digital Communications Infrastructure
To promote Broadband for all as a tool for socio-economic development, while ensuring service
quality and environmental sustainability.
✓ Propel India: Enabling Next Generation Technologies and Services through Investments,
Innovation and IPR generation
32. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
To harness the power of emerging digital technologies, including 5G, AI, IoT, Cloud and Big Data
to enable provision of future ready products and services; and to catalyse the fourth industrial
revolution (Industry 4.0) by promoting Investments, Innovation and IPR.
✓ Secure India: Ensuring Sovereignty, Safety and Security of Digital Communications
To secure the interests of citizens and safeguard the digital sovereignty of India with a focus on
ensuring individual autonomy and choice, data ownership, privacy and security; while recognizing
data as a crucial economic resource.
In September 2018, Union Cabinet approved the National Digital Communications Policy-2018 (NDCP-
2018). Read more/Download
• DoT issued 13-digit numbers for the trial of machine-to-machine (M2M) communications
Department of Telecom (DoT) has issued 13-digit numbers to telecom operators for the trial of
machine-to-machine (M2M) communications like swipe machines, smart electric metres and car
tracking devices etc. that communicate through a SIM card. However, the new plan, which is to be
implemented by telecom operators by July 1, will not impact the existing mobile phone users and is only
meant for M2M equipment. The 13-digit numbers have been allocated to state-run firm BSNL and
private telecom operators Bharti Airtel, Reliance Jio, Idea Cellular and Vodafone for testing purposes
only.
According to a letter sent by the DoT to operators, the authority has approved allocation of "1 million
codes for testing purpose for each LSA (licence service area)" to service providers.
M2M communication, a new-age technology, is at the heart of concepts such as smart homes and
smart cars. M2M communication can include a gas, electricity or water meter communicating
information it records such as consumption level, or a vending machine alerting distributor when stocks
run low, or transmission of data about personal appliances. The Telecom Regulatory Authority of
India has recommended that all telecom licence holders should be allowed to provide M2M service
using any spectrum. However, it has suggested that critical M2M services should be provided by those
companies who have licensed spectrum.
33. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
The regulator has also recommended that government to issue new category of licence for M2M
services for companies interested in providing or operating services in this segment only. Read more
• National Telecom M2M Roadmap:
Department of Telecommunications (DoT), Ministry of Communications and Information Technology
had Published National M2M roadmap in May 2015. The roadmap covers global scenario on M2M
Standards, Regulation and policies, Initiatives, Make in India: Supported through M2M Adoption and
Approach & Way Forward including set of recommendation:
o To facilitate M2M communication standards including encryption, quality, security and privacy
standards from Indian Perspective and to recognize such standards for India.
o To release national M2M Numbering Plan (within year 2015).
o Address M2M Quality of Service aspects.
o To address M2M specific Roaming requirements.
o To formulate M2M Service Provider (MSP) registration process.
o To issue guidelines for M2M specific KYC, SIM Transfer, International roaming etc.
o Formation of APEX body involving all concerned stake holders.
o To address M2M specific spectrum requirements.
o To define frequency bands for PLC communication for various Industry verticals
o Finalization of M2M Product Certification process and responsibility centres.
o Facilitating M2M Pilot projects.
o Measures for M2M Capacity building.
o To establish Centre of Innovation for M2M.
o To assist M2M entrepreneurs to develop and commercialize Indian products by making available
requisite funding (pre-venture and venture capital), management and mentoring support etc.
o Inclusion of M2M devices in PMA Policy.
o To take up matters with relevant ministries to boost M2M products and services.
o Define procedures for energy rating of M2M devices and implementation of same.
o To evolve suitable guidelines of EMF radiation of M2M devices based on research and studies by
relevant bodies.
DoT Draft M2M Service Providers Registration Guidelines Covering:
o Terms & Conditions for M2MSP Registration
34. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
o Technical Conditions for M2MSP Registration
o Security Conditions and a provision such as:
The M2MSP shall induct only those devices/equipment in the network which meet TEC/TSDSI/BIS
standards, wherever specified as mandatory by the Authority from time to time and in the absence of
mandatory TEC/TSDSI/BIS standard, the M2MSP may deploy those devices/ equipment that is certified
in compliance to meet the relevant standards set by National and International standardization bodies,
such as 3GPP, BIS, TSDSI, ITU, OneM2M, IEEE, ISO, ETSI, IEC etc.
• TRAI recommendations for M2M IoT service guidelines
The Regulator has released its recommendation on its consultation on 5th
September 2017 on
“Spectrum, Roaming and QoS related requirements in Machine-to-Machine (M2M) Communications”
The Authority has finalized the following recommendations on:-
I. All existing telecom service providers can be allowed to provide Machine-to-Machine (M2M) or IoT
solutions within their specified circle of operations.
II. License holders can use existing spectrum to provide IoT services while TRAI is also considering
de-licensing spectrum under the 867-868 MHz, 915-935 MHz and 57-64 GHz bands for M2M and
IoT.
III. The regulator has also put forward recommendations on SIM roaming, Quality of Service levels,
privacy, security, and other aspects of IoT/M2M.
For more information please click here
• Internet of Things (IoT) Policy by Meity
India, in the recent few years, has been moving towards becoming a digital economy. The digital space
in India has seen a lot of transformations and Internet of Things (IoT) is a recent phenomenon. Hence
the Department of Electronics and Information Technology (DeitY) has drafted India’s first ‘Internet of
Things Policy’ in October 2016.
Vision:
“To develop connected and smart IoT based system for our country’s Economy, Society, Environment
and global needs. “
Objectives:
35. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
o To create an IoT industry in India of USD 15 billion by 2020. It has been assumed that India would
have a share of 5-6% of global IoT industry.
o To undertake capacity development (Human & Technology) for IoT specific skill-sets for domestic
and international markets.
o To undertake Research & development for all the assisting technologies.
o To develop IoT products specific to Indian needs in all possible domains.
o The Policy framework of the IoT Policy has been proposed to be implemented via a multi-pillar
approach. The approach comprises of five vertical pillars (Demonstration Centres, Capacity
Building & Incubation, R&D and Innovation, Incentives and Engagements, Human Resource
Development) and 2 horizontal supports (Standards & Governance structure).
India’s first Internet of Things Policy comes at the most appropriate time when the country is moving
towards digitalization and a policy like this will support the initiatives taken in this direction. Two major
efforts taken by the Government of India which will lead to a rapid growth of IoT industry are Smart
Cities project and Digital India Program. Read more/Download
• The institution of Engineering and Technology (IET) INDIA IOT Panel
IET – The institution of Engineering and Technology INDIA has established it’s IOT Panel which is
focussing on the areas: Retail, Energy, Healthcare, Agriculture, Connected Homes, IoT Labs,
Standards & Legal, Education and Social Impact. Read more about IET India IoT Panel here.
2.2.2. M2M Standardization Activities
• Bureau of Indian Standards (BIS):
BIS Panel on ICT New & Emerging Technology covers topics of Smart cities (ICT technology
area - ISO/IEC/JTC 1/SG1[WG11]), Big Data (ISO/IEC/JTC 1/SG 2), Internet of Things
(ISO/IEC/JTC 1/SWG 5 &WG 10), Sensor networks (ISO/IEC/JTC 1/WG 9), Systems Evaluation
Group - Smart Cities (IEC/SEG 1), Systems Evaluation Group - Ambient Assisted Living (IEC/SEG
3), Active Assisted Living (IEC/SyC AAL), Smart Energy (IEC/Smart Energy) and Smart
Manufacturing (IEC/SG 8).
36. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
BIS has divided the work into two division council as follows:
BIS LITD 27:
To develop standards in the field of Internet of Things and related technologies including sensor
networks; wearable electronic devices and technologies; and big data. And act as the National
Mirror Committee for ISO/IEC JTC 1/SC 41 Internet of Things and related technologies, ISO/IEC
JTC 1/WG 9 Big data, IEC/TC Wearable electronic devices. Comprises of Work Groups on IoT
Architecture, IoT Interoperability, IoT Applications & Wearable Devices; and Study Groups on IoT
Trustworthiness, Wearables, Industrial IoT, Real Time IoT, Industrial IoT & Aspects of IoT Use
Cases. BIS LITD 27 is currently evaluating some ISO Standards developed by JTC1/SC41 to
adopt as National Standards.
BIS LITD 28:
Standardization in the field of Smart Cities (Electro-technical and ICT aspects) and related
domains including Smart manufacturing & Active assisted living. Current Standards development
on the following:
• Reference Architecture for Unified Secure & Resilient ICT Infrastructure for Smart Cities
• Unified Last Mile Communication Architecture & Protocols for Smart Infrastructure
• Common Service Layer for Unified Smart Cities/Infrastructure ICT Architecture
• Unified Data Semantics, Data Models & Ontology in Smart Cities & Smart Infrastructure
Paradigm
• Security & Resilience Framework
• Use Cases in Smart Infrastructure Paradigm
• Standards Inventory & Mapping for Smart Infrastructure Paradigm
The LITD 28 has also released a Pre-Standardization Study Report on Technical Requirements
Analysis of Unified, Secure & Resilient ICT Framework for Smart Infrastructure. It is aimed at
providing some critical Actionable Insights for Smart City Planner in context of Unified Secure &
Resilient ICT Infrastructure in Smart Cities. LITD 28 has also constituted a study group on 5G
imperatives for Smart Infrastructure to define a smooth migration path from current frameworks
and architectures to ‘5G inclusive’ next generation homogeneous architectures.
37. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
• Telecommunication Engineering Centre (TEC)/Department of Telecommunication
o Mandatory Testing and Certification of Telecom Equipment (MTCTE):
The Department of Telecommunications, Ministry of Communications, and Government of India
vide Gazette Notification No. G.S.R. 1131(E) dated 5th September, 2017 has amended the Indian
Telegraph Rules, 1951 (Amendment 2017) to introduce Mandatory Testing & Certification of
Telecom Equipment. These rules shall come into effect from October 1st, 2018.
TEC is implementing Mandatory Testing & Certification of Telecom Equipment in India. For the
compliance of these rules, testing and certification of the telecommunication equipment shall be
done with the respective Essential Requirements (ER) documents to be framed by TEC. TEC is in
the process of formulation of ERs for the Mandatory Testing and Certification of Telecom
Equipment.
In a recent notification issued on 28th
September 2018, TEC has extended the deadline for starting
mandatory testing of telecom equipment including mobile devices and base transceiver stations
(BTS) to April 1, 2019 from October 1, 2018.
TEC in DoT has been entrusted the Framing of ERs (Essential Requirements) for Testing and
Certification of Smart Devices in M2M/IoT domain. Comprehensive consultations with all the
ecosystem stakeholders are being undertaken by IEC senior officials to ensure smooth
implementation of the Testing & Certification processes. Essential Requirements will have
requirements mainly related to safety, security, technical and functional parameters. The Security
Division of Telecommunication Engineering Centre (TEC), Department of Telecommunications,
shall be responsible for activities related to the telecom network security under the overall policy
on the cyber security and telecom security.
The focus areas of Security Division are:
✓ Contribute in defining the Security framework for ICT network, including security objectives,
threats and vulnerabilities, management strategies and challenges associated with it;
✓ Contribute in defining the Security indexing guidelines for telecom equipment in line with ITU-
T recommendations X.1521 on CVSS i.e. Common Vulnerability Scoring System;
✓ Defining security auditing guidelines specific to telecom Service providers in accordance with
ISO 27001;
✓ Co-ordinate with DoT, MHA and other cyber security agencies
38. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
o M2M working groups:
- NT cell of DoT is working on framing policy on M2M communication. TEC had been assigned
the task to undertake studies through stakeholders and finalize Indian specific
standards/specifications and also to make contributions in International Standardization
effort.
- To begin with, five multi stake holders Working Groups as detailed below were formed in
TEC in March 2014. Working Groups are having members from TEC, DoT, Telecom
Service Providers (TSPs), OEMs, R&D organizations, Vertical Industries, MNCs, IT / ITes,
Semiconductor industries and standardisation bodies( ETSI, TSDSI, BIS etc).
a) Gate way and Architecture
b) Power
c) Automotive
d) Health
e) Safety and Surveillance
- Joint Working Group (JWG): It comprises members of all the working groups.
- Following new working groups have been created in June-2015
a) Security (End to End security of M2M domain
b) Smart city
c) Smart Homes
d) Smart villages and Agriculture
e) Smart Environment (Environment monitoring and and Pollution Control)
f) Smart Governance
- Frame of Reference for the working Groups was prepared and approved in the JWG
meeting. (Click here)
- Since 2015, TEC has been regularly releasing study reports on various topics in M2M/IoT
domain.
Technical Reports (Release 1 and Release 2) of M2M working groups given below:
39. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
M2M/ IoT Technical Reports (Release 1.0, May 2015):
o M2M Gateway & Architecture
o M2M Enablement in Power Sector
o M2M Enablement in Automotive (Intelligent Transport System) Sector
o M2M Enablement in Remote Health Management
o M2M Enablement in Safety & Surveillance Systems
o ICT deployment and strategies for India’s Smart Cities: A Curtain Raiser
M2M/ IoT Technical Reports (Release 2.0, November 2015):
o M2M Number resource requirement & options
o V2V / V2I Radio communication and Embedded SIM
o Spectrum requirements for PLC and Low power RF communications
M2M / IoT Technical Reports (Release 1.0, March 2017)
o M2M/ IoT Enablement in Smart Homes
M2M / IoT Technical Reports (Release 1.0, July 2017)
o COMMUNICATION TECHNOLOGIES in M2M / IoT Domain
• C-DOT M2M/IOT platform based on oneM2M specifications
C-DOT has developed CCSP(C-DOT Common Service Platform), the oneM2M standards
compliant common service platform which can be deployed on any off-the-shelf generic server
platforms or cloud infrastructure. The business application providers can deploy their oneM2M
compliant applications in either co-located infrastructure or on any public or private cloud. Using
the CCSP platform from C-DOT, the smart cities can reap all the benefits of using a standards
compliant horizontal service layer and thus be more efficient, economical and future proof. Along
with the CCSP C-DOT has also developed various oneM2M indigenously designed hardware
nodes like AND (Application Dedicated Node), ASN (Application Service Node) and MN (Middle
node).
40. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
To effectively showcase the strength of the platform, C-DOT has also developed various
applications like Smart Living, Smart Street Light, Carbon Footprint Monitoring Application and
Power Monitoring which are fully oneM2M compliant. C-DOT has also participated in two
international interoperability events where the CCSP and the ADN were tested for interoperability
with many other oneM2M compliant nodes from various international organisations like Interdigital,
Herit, Huawei, HPE, NTT, KETI, LAAS-CNRS etc. C-DOT also participated in the conformance
testing with ETSI. Read more
• Telecommunication Standards Development Society, India (TSDSI):
• TSDSI WG on M2M/IoT:
TSDSI is the government recognized body working on ICT including M2M standards. It is a not for
profit industry led legal entity with participation from all stake holders including Government,
service providers, equipment vendors, equipment manufacturers, academic institutes and
research labs etc. It aims at developing and promoting research based India-specific
requirements, standardizing solutions for meeting these requirements, contributing to global
standardization in the field of telecommunications, maintaining the technical standards and other
deliverables of the organization and safe-guarding the related IPR. TSDSI WG published reports
on M2M/IoT given below:
TSDSI WG on M2M/IOT published report covering Indian Use cases:
M2M Use Cases for Utilities-V0.2.0-20151003 advance for NWG
M2M Use Cases for Environment Pollution Monitoring & Control
M2M use cases for SmartCities-V0.2.0-20151003 advance release for NWG20
M2M Use Cases for Smart Governance -V0.2.0-20151003 advance for NWG
M2M Use Cases for Remote Asset Management-V0.2.0-20151003 advance for NWG
M2M Use Cases for Transportation V0.2.0 20151003 advance for NWG
M2M Use Cases on Industrial Automation V0.2.0-20151003
M2M Use Cases on Smart Homes V0.2.0-20151003 advance release for NWG
M2M Use Cases on Health V0.2.0- 20151003 advance for NWG
41. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
• Transposition of oneM2M Specifications Rel 2 (comprising 17 specifications and 10 technical
reports) into TSDSI Standards. These have been published on TSDSI website. (click here)
• Transposition of 295 Specifications of 3GPP (select specifications from Rel 10 to Rel 13) for
IMT Advanced (as per ITU-R M.2012-3) into TSDSI Standards. (click here)
• TSDSI has been mandated by MoC to develop Standards for Cloud Services Interoperability
and adapt 3GPP specifications related to Security.
3. Various Communication Technologies for M2M/IoT
Cellular technologies have played an instrumental role in connecting the people to one another via
voice, and also extended connectivity to the mobile Internet by delivering fast and mobile broadband
services. In the area of M2M / IoT, data from the devices will vary from few kilobits (water/ electricity
meters, environmental sensors) to several megabytes (Security camera) depending upon the use case.
Data may be in the form of bursts and may also be non-critical / critical in nature.
In M2M/ IoT domain, there are various types of communication technologies depending upon the
coverage, power, QoS etc. Communication technologies may be categorized to work in TAN / PAN/
NAN/ LAN / WAN depending upon coverage distance. These have been shown in Figure below:
Source: TEC
42. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
Wide area network may also have wired technologies such as fixed line broadband, Fiber to the home
(FTTH) and Power line communication (PLC).
Connectivity is the foundation for IoT, and the type of access required will depend on the nature of the
application. Many IoT devices will be served by radio technologies that operate on unlicensed spectrum
and that are designed for short-range connectivity with limited Quality of Service (QoS) and security
requirements typically applicable for a home or indoor environment. Currently, there are two alternative
connectivity tracks for the many IoT applications that depend on wide-area coverage:
1. Cellular technologies: 3GPP technologies like GSM, WCDMA, LTE and future 5G. These
technologies operate on licensed spectrum and historically have primarily targeted high-quality
mobile voice and data services. Now, however, they are being rapidly evolved with new
functionality and the new radio access technology Narrowband IoT (NB-IoT) specifically tailored to
form an attractive solution for emerging low power wide area network (LPWAN) applications. LTE
is established globally and is the fastest growing wireless standard, already delivering over one
billion connections worldwide. LTE has delivered on the promise of faster, better mobile
broadband, and it is now scaling down for the IoT to bring multi-year battery life and lower cost
devices. It is backed by a common global standard (3GPP) with support of a strong, interoperable,
end-to-end ecosystem.
2. Non-Cellular Wireless Technologies: Low power and short range wireless technologies such as
Bluetooth, ZigBee, have been developed as last mile connectivity to connect End Devices to
Gateways. On the other hand, radio technologies, provided by SIGFOX and LoRa, have been
developed and designed solely for machine-type communication (MTC) applications with relatively
limited demands on throughput, reliability or QoS.
Besides this there are a number of other technologies for short range like Wi-Fi, NFC, RFID, etc. as
shown in Figure above.
2.3. Comparison Table for wired and wireless Technologies
43. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
A technological description in brief has been given in the following table. However a detailed description
has been taken up in the following chapters:
Table: Comparison of Communication Technologies
Technolo
gy/Protoc
ol
Frequency
band (s)
Advantages Limitations Suitable for
Wireless
Bluetooth
Low
Energy
2.4 GHz • Mature
technology
• Easy to
implement
• Low Power
• Powered by
coin cell
• Longer battery
life
• Small data
packets
• Healthcare
devices
• Fitness devices
• Smart Metering
NFC 13.56 MHz • Consumes less
power
• Almost
instantaneous
connectivity
between
devices
• No power is
required in-
case of passive
Tags
• Extremely
short range
• Expensive
• Low
information
security
• Low market
penetration
• Healthcare
devices
• Fitness devices
• Smart Metering
Wi-Fi 2.4 GHz • Mature
technology
• High
home/office
penetration
• High data rates
achievable
• Easy to
implement
• Limited
range
• Poor building
penetration
• High
interference
from other
sources
• Power
consumption
higher
than those
technologies
• Base station in
Health Clinics
• Smart Metering
• Home
Automation
44. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
that operate
in the sub-
GHz band
ZigBee 2.4 GHz,
920 MHz,
915 MHz,
868 MHz,
780 MHz
• Full support of
IEEE 11073
device
specialization
profile
• Longer battery
life from low
cost coin cells
for
wearable
Devices
(source: ZigBee
alliance)
• Wireless range
up to 70 meters
indoor and 400
meters outdoor
(source: ZigBee
alliance)
• Not widely
adopted
• BLE is the
direct
competition
for ZigBee
providing
different
modes/profil
es of
operation.
BLE is
getting
adopted
faster than
ZigBee
within short
span of time
• Health Monitoring
and Safety
• Client Activity
Monitoring
• Health and
Wellness
monitoring
Z-Wave Sub 1GHz
for India
(865-867
MHz)
• Standardised by
CSR 564 (E)
• very successful
due to its ease
of use and
interoperability
• Majority share of
the Home
Automation
market
• Proprietary
radio
systems
available
• Limited
Range drives
up
costs
• Security systems.
• Home automation
• Lighting controls
Wi-SUN Sub 1GHz
for India
(865-867
MHz)
• Open standards
based
• Interoperable
• High data rate
• Long Range
• Widely adopted
in Japan,
Singapore and
USA. Currently
being adopted in
Asia, Australia
• Not widely
adopted in
India
• Based on
latest IEEE
standard
which is not
yet adopted
widely
• Smart metering
• Distribution
Automation
• Smart Home
• Smart City
• Industrial
automation
45. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
South America
and parts of
Europe and
other
regions
• Low power
consumption
• Operates as RF
mesh network
delivering higher
reliability.
ANT 2.4GHz • Low power
mode
supporting
longer battery
life
• Adopted by
major mobile
manufacturer
• Supports mesh
capability which
is an edge over
BTLE
• BLE is giving
direct
competition
to ANT as it
is
already
supported by
all the mobile
manufacturer
• Not all
mobile
Manufacturer
is supporting
ANT
hardware
• Low
penetration
in market is
less due to
present eco-
system of
other
Wireless
Technologies
• Fitness device
• Healthcare
device
Cellular
(2G,3G,L
TE,NB-
IoT and
5G)
For India,
900 MHz,
1800 MHz,
2100 MHz
and 2300
MHz is
allocated.
• Mature
technology
• Rapid
deployment
• Communication
modules are low
cost and
standardised.
• Roaming
• Coverage
not
100%
• Reliability not
the best
• Short
technology
life-cycle
(2G,
EDGE, 3G,
• Tele-Health
• Remote Health
Monitoring
• Smart Metering
46. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
LTE etc.)
LoRaWA
N
Sub GHz
ISM Band
865 -867
MHz
www.lora-
alliance.org
• Network can be
defined by the
individuals /
owners.
• Support long
range and high
battery life
• High security
using AES 128
encryption
• Own
deployment
with no
subscription
fees
• Works in
unlicensed
band.
Public
networks
being
deployed by
SenRa and
Tata
Communicati
ons for large
scale
deployments
• Smart Metering
• Smart street
Lighting solutions
• Asset monitoring
• Smart Bin
• Smart Parking
• Smart Agriculture
• Smart
Environmental
Sensing
• Geo Tracking
SIGFOX ISM
(Unlicensed)
band in Sub
GHz
• Largest global
network
dedicated for
IoT/M2M/M2C.
• Deployed in 50+
countries.
• Lowest TCO
across
transceiver,
module, device
and
connectivity.
• Mature
technology with
Anti-jamming
feature and
resilience to
interference.
Largest partner
ecosystem –
Semi, Module,
Device,
Platform.
• Deployment
by Network
Operator
• Subscription
fee based
network
access
• Smart Metering,
• Smart Lighting
• Asset Monitoring
and tracking
DSL 0-2.208 MHz • Inexpensive
(installation and
• Low data
security
• Gateway for
Remote Health
47. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
use)
• High SLA
• Less installation
time
• Bonded DSL
provides
inherent
redundancy
• Lower
throughput
• Higher
latency
Monitoring
• Concentrator for
Tele-Health
• Home
Automation
Ethernet 16,100,250
,500, 600
MHz 1
GHz, 1.6-
2.0 GHz
• Inexpensive
(installation and
use)
• Excellent
throughput
• Low installation
time
• Easily scalable
• Lowest data
security
• Lowest SLA
• Highest
latency
• Bursts of
additional
bandwidth
not possible
• Gateway for
Remote Health
Monitoring
• Concentrator for
Tele-Health
• Smart Metering
• Home
Automation
PLC No defined
frequency
band in India
• Ready
infrastructure
• Communication
possible in
challenging
environments
such as
underground
installations,
metal-shielded
cases etc.
• Long technology
life-cycle
• Many standards
and protocols
available
• Point-to-point
communicati
on
• Can cause
disturbances
on the lines
• Not suitable
where power
cables are
not in a good
condition;
initial and
ongoing line
conditioning
and
maintenance
can add
significant
O&M costs
• Highly
trained
manpower
required for
O&M
• Communicati
on not
possible in
case of an
outage
• Smart metering
• Home automation
48. Standards, Legal & Privacy October 2018 www.theiet.in/IoTPanel
• Absence of
regulations
on use of
frequency
bands
Source: Technical report (TEC)
4. Role of M2m/IoT in Smart City Mission in India
These are top five technologies which play an important role in building smart cities in India.
o Machine to Machine technologies
o Data Security
o New Storage Technologies
o Technologies for Renewable Energy
o Disaster Management technology
• M2M technology plays an important role in building smart cities because without M2M technology,
it would be impossible for Smart Cities to exist.
• The smart city transformation would be fueled by advance technology and the deployment of
intelligence & information management systems.
• Dream of Smart cities can be achieved at accelerated pace with higher reliance on ICT
(information and communications technology).
• IoT is the backbone of Smart Cities. However, without a robust security and privacy infrastructure,
there can be no practical and safe application of IoT within a Smart City. Access and control
standards for ICT networks within the Smart City are imperative for both data and human security,
the lack of which can cause serious threats and vulnerabilities to all who live and operate in such
cities.
• As Smart Cities grow, the amount of information gathered and stored for analysis and record will
grow tremendously. New storage technologies, such as flash, high-capacity drives, software-
defined storage and Cloud infrastructures, etc., will only grow to serve IoT deployments needed in
Smart Cities.
• Solar, wind, electric mobility, biogas and other alternatives will greatly shape the success of India’s
Smart City infrastructure. Smart cities require large amounts of energy supply that can only be
achieved through recycling, effective management and new sources of energy.