The ability for everyday devices to connect with each other and with people is a hot topic.
The Nigerian Communications Commission identified a need for the Nigerian legal system to be aware of present and future possibilities, grey areas and learnings from other countries that have taken proactive steps to prepare for this inevitable future.
Learnings from the EU, USA, China etc are considered. It is comforting to know that no country claims to have its legislation ahead of the tech innovations curve, but the catchup game needs to be at a pace that dragnets the present effectively and constantly repositions for the unknown future.
Regulation should also be smart. Rather than get bogged down regulating aluminium weight for car use, fuel grades for combustion, rather regulate speed (protect lives) and drive regulation by principles that outlive wherever tech wants to go next.
The session was eye-opening for a good number of the aged and candid judges, but it was gladdening to see the mindset: mobile tech is not "that thing", it has to be used, understood and admitted as evidence.
The nerds and more tech savvy should help these 'learned ones' to better embrace tech and help them do their work better for joint good!
Attendee/delegate feedback was candid and NCC hopes to build on this in the coming years.
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
"Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Driven Innovation." A presentation by Adam Thierer (Mercatus Center at George Mason University) made on September 11, 2014 at AEI-FCC Conference on "Regulating the Evolving Broadband Ecosystem."
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
The world today is seemingly always plugged into the Internet and technologies are constantly sharing data about our personal and professional lives. Device connectivity is on an upward trend with Cisco estimating that 50 billion devices will be connected to the Internet by 2020. Collection and data sharing by these devices introduces a host of new vulnerabilities, raising concerns about safety, security, and privacy for policymakers and regulators.
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
"Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Driven Innovation." A presentation by Adam Thierer (Mercatus Center at George Mason University) made on September 11, 2014 at AEI-FCC Conference on "Regulating the Evolving Broadband Ecosystem."
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
The world today is seemingly always plugged into the Internet and technologies are constantly sharing data about our personal and professional lives. Device connectivity is on an upward trend with Cisco estimating that 50 billion devices will be connected to the Internet by 2020. Collection and data sharing by these devices introduces a host of new vulnerabilities, raising concerns about safety, security, and privacy for policymakers and regulators.
“Permissionless Innovation” & the Clash of Visions over Emerging TechnologiesAdam Thierer
"Permissionless Innovation & the Clash of Visions over Emerging Technologies." A presentation created by Adam Thierer (Mercatus Center at George Mason University). It focuses on coming public policy fights over various emerging technologies, such as: driverless cars, the Internet of Things, wearable technology, commercial drones, mobile medical innovations, virtual reality, and more.
This presentation has been updated to reflect most recent version.
George konstantakis iot and product design360mnbsu
The Internet of Things (IoT) may be at the core of the next Industrial Revolution! The socioeconomic implications of IoT, in general, are astounding. As with all disruptive technology, there are threats and opportunities that must be understood by business leaders. How do these implications relate to the needs of manufacturing businesses and the human resources that are intertwined with them? How can Product Design address those needs? This closing session will explore these questions and offer solutions.
E-governance, Issues Concerning Democracy, National Sovereignty, Personal
Freedom, Emerging Social Issues from Cyberspace, Digital Divide, Promotion of
Global Commons, Open Source Movement, Laws and Entities Governing
Cyberspace, Domestic Laws: Background of IT ACT – Part I, IT Act – Part II,
International Treaties, Conventions and Protocols Concerning Cyberspace,
Guidelines Issued by Various Ministries
Mobile technology has made the Internet of Things (IoT) possible. With wifi powered light bulbs, thermostats we can control from our phone and devices that tell us how much energy we’re using in our homes/businesses the sky’s the limit. In this session Nicole Engard will walk you through what technologies are out there for your home and library. She will cover how to keep yourself secure and discuss future design ideas for the Internet of Things’ usefulness in our libraries.
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
Much of our technology today is connected to the Internet and communicating information about us, our homes and businesses, back to manufacturers in order to give us something of value in return. It is estimated that by 2025, there may be as many as 80 billion Internet of Things (IoT) devices connected to the Internet. As IoT becomes a normal part of our everyday lives, at home, on the road, and at the office, privacy, security and safety become paramount.
This presentation will set the stage: What is IoT? How is it used today? How will it be used in the future? IoT provides both opportunities and risk to society, and IoT devices need to be secured as this world of connected devices become critical to how society functions.
Internet of Things, is a new revolution of the Internet. Objects make themselves recognizable and they get intelligence thanks to the fact that they can communicate information about themselves and they can access information that has been aggregated by other things. Alarm clocks go off early if there’s traffic; plants communicate to the sprinkler system when it’s time for them to be watered; running shoes communicate time, speed and distance so that their wearers can compete in real time with people on the other side of the world; medicine containers tell your family members if you forget to take the medicine. All objects can get an active role thanks to their connection to the Internet.
IoT & Big Data - A privacy-oriented view of the futureFacundo Mauricio
Understanding the future based on the current technology, with a focus on Big Data and Internet of Things (IoT). A discussion of privacy and personal information and how it affects us.
“Permissionless Innovation” & the Clash of Visions over Emerging TechnologiesAdam Thierer
"Permissionless Innovation & the Clash of Visions over Emerging Technologies." A presentation created by Adam Thierer (Mercatus Center at George Mason University). It focuses on coming public policy fights over various emerging technologies, such as: driverless cars, the Internet of Things, wearable technology, commercial drones, mobile medical innovations, virtual reality, and more.
This presentation has been updated to reflect most recent version.
George konstantakis iot and product design360mnbsu
The Internet of Things (IoT) may be at the core of the next Industrial Revolution! The socioeconomic implications of IoT, in general, are astounding. As with all disruptive technology, there are threats and opportunities that must be understood by business leaders. How do these implications relate to the needs of manufacturing businesses and the human resources that are intertwined with them? How can Product Design address those needs? This closing session will explore these questions and offer solutions.
E-governance, Issues Concerning Democracy, National Sovereignty, Personal
Freedom, Emerging Social Issues from Cyberspace, Digital Divide, Promotion of
Global Commons, Open Source Movement, Laws and Entities Governing
Cyberspace, Domestic Laws: Background of IT ACT – Part I, IT Act – Part II,
International Treaties, Conventions and Protocols Concerning Cyberspace,
Guidelines Issued by Various Ministries
Mobile technology has made the Internet of Things (IoT) possible. With wifi powered light bulbs, thermostats we can control from our phone and devices that tell us how much energy we’re using in our homes/businesses the sky’s the limit. In this session Nicole Engard will walk you through what technologies are out there for your home and library. She will cover how to keep yourself secure and discuss future design ideas for the Internet of Things’ usefulness in our libraries.
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
Much of our technology today is connected to the Internet and communicating information about us, our homes and businesses, back to manufacturers in order to give us something of value in return. It is estimated that by 2025, there may be as many as 80 billion Internet of Things (IoT) devices connected to the Internet. As IoT becomes a normal part of our everyday lives, at home, on the road, and at the office, privacy, security and safety become paramount.
This presentation will set the stage: What is IoT? How is it used today? How will it be used in the future? IoT provides both opportunities and risk to society, and IoT devices need to be secured as this world of connected devices become critical to how society functions.
Internet of Things, is a new revolution of the Internet. Objects make themselves recognizable and they get intelligence thanks to the fact that they can communicate information about themselves and they can access information that has been aggregated by other things. Alarm clocks go off early if there’s traffic; plants communicate to the sprinkler system when it’s time for them to be watered; running shoes communicate time, speed and distance so that their wearers can compete in real time with people on the other side of the world; medicine containers tell your family members if you forget to take the medicine. All objects can get an active role thanks to their connection to the Internet.
IoT & Big Data - A privacy-oriented view of the futureFacundo Mauricio
Understanding the future based on the current technology, with a focus on Big Data and Internet of Things (IoT). A discussion of privacy and personal information and how it affects us.
The term “Internet of Things” refers to all those objects or
devices of everyday life that are connected to the Internet
and that have some kind of intelligence.
With the new interconnected age comes new risks for cyber attacks and other fraudulent activity. Do you know what you need to keep your end users protected? Digital Insight discusses security and compliance in the interconnected age.
Presented at the Gartner Identity & Access Management Summit, London, Travis Greene discussed the opportunities and challenges of the Internet of Things (IoT), as well as the early indicators of what the IoT world will look like. He also addressed IoT security and privacy, and the critical role that identity will play in the future.
On Oct. 22, the University of Texas at Austin's Center for Identity presented “The Internet of Things,” a webcast focused on providing actionable tips for navigating an increasingly connected world. John Danaher, President of TransUnion Interactive, discussed the latest advances in connected technology, the challenges they pose to our personally identifiable information (PII), and ways we can safeguard our PII while remaining connected.
What is Cyber Law? Why is cyber security law needed? International cyber law. What is copyright? What are security, controls, privacy, piracy and ethics? Code of ethics for computer professionals. What is cyber insurance?
Digital music exploitation in Nigeria - Digital Licensing Committee recommend...Simon Aderinlola
Music services are the largest part of Nigeria's mVAS. Litigations fly, local copyright owners suffer, an industry sub-sector is at risk. A step back review indicates that the rules - designed for vinyl and CD - have not been upgraded in an environment where OTT players have taken off. This is a call to revisit first principles.
Policy makers as marketers of the industry - key considerations for desired i...Simon Aderinlola
Policy making tips the scale either for or against the ease of doing business and of general industry growth. This document - with examples of Nigerian opportunities for policy done well - makes the case for policy-crafting and -shaping professionals to assume their role, not as aloof umpires, but as stakeholders who ensure mobile-driven industries succeed.
Reducing the hit &-miss in scaling up an agent networkSimon Aderinlola
Distribution networks have been the identified as the must-haves of Mobile money/payment and bank penetration for financial services. The landscape is littered with failures and several are struggling. this presentation speaks to the soft, oft-neglected necessaries in preparing to scale.
Mobile Value-added services are fast-becoming THE service on mobile. Mobile operator and regulator challenges irrespective, well-crafted and well delivered VAS will always win. This presentation at a 2014 regional summit alongside a rich panel helped filter out in a few words and a single slide what the VAS consumer need really is...be it in Nigeria, Ghana or globally.
There is much work to be done.
For a market like Nigeria, adjudged by Microsave as having less than 3,000 active MFS agents by Dec 2013, we should roll up our sleeves and stop trading buzzwords.
This presentation is hinged on the back of a 2013 nationwide survey that gave birth to BeyondBranches. It shares some of the findings, starting from the importance of proposition clarity and benefits communication.
It helps profile an average Nigerian agent, identifies words that belong more in our conferences and offices that may mean nothing yet to the MSME target on the field.
It identifies pockets of Financial exclusion even in tier-1 Nigerian cities and indicates what BeyondBranches IS DOING today to fill this gap.
Avoiding agent churn in fledgling markets: keeping agents busy from day 1Simon Aderinlola
MobileMoney deployments cannot successfully scale without a well deployed and oiled agent network element. Silo market approach by licensees left agents isolated and dis-incentivized with how the business case actually played out when they signed up as Agents.
This presentation showcases the Nigerian example to help identify the problem and the story summits with very simply-worded but high impact actions to keep agents profitably engaged
Bridging the regulator regulated divide - the minefield and goldmineSimon Aderinlola
In the MobileMoney space of fledgling markets, the regulator-licensee relationship is oft mismanaged...inadvertently. This presentation recommends simple but profound steps for both parties to beneficially engage, rather than lock horns from a distance.
VAS as catalyst for MobileMoney uptake: a Nigerian caseSimon Aderinlola
Nearly 2 years since MobileMoney was launched in Nigeria (Aug 2011), experts are justifiably concerned about awareness & service uptake levels, the inertia to exit the cash culture and the enablers to make this happen. This work identifies the de-motivations and posits fresh ways of looking at the problem in a pull approach using VAS, assuming worst case, that these listed issues don't go away as soon as expected. The good news is that something good IS being done in this regard.
VAS as catalyst for MobileMoney uptake: a Nigerian case
The internet of things..perspectives for the Nigerian legal system
1. Important & Realistic Legal
Perspectives beyond the hype
Simon Aderinlola
NCC-NJI Workshop June 2015, Abuja, Nigeria
2. A Hot topic worldwide
There’s already a plethora of conferences, projections,
webinars, discussion sessions & consultants around the
‘Internet of Things’
3. A Hot topic worldwide
There’s already a plethora of
conferences, projections, webinars,
discussion sessions & consultants
around the ‘Internet of Things’
4. Intros: what this is not about
This presentation won’t try to impress you with the extent of
the tech around The Internet of Things.
A few slides will indicate where IoT is in 2015, but it won’t dwell
on just that.
The aim is also not to belly-ache about what Nigeria is not
doing at present, but to:
1. build a possibility picture and
2. make useful recommendations to shape policy
5.
6. What is the Internet of things?
First, what is the Internet?
a global system of interconnected computer networks linking
billions of devices worldwide, using standardized communication
protocols to provide a variety of information and communication
facilities.
Next, what is the Internet OF THINGS?
Short-definition: The ability for everyday devices to connect with each
other and with people
Long-definition: The Internet of Things, also called The Internet of
Objects, refers to a wireless network between objects, usually a
network that’s both wireless & self-configuring, such as household
appliances....Wikipedia
7. What is the Internet of things?
How does it come about?
By embedding short-range mobile transceivers into a wide array of
additional gadgets & everyday items, enabling new communication
forms between people and things, and between things themselves,
we enable, not just for the wow factor, but for true convenience.
Reality check
• Today, there are 6 billion internet-connected devices
• By 2020, estimates put that number as high as 50 billion: 4-7
connected devices per person
• At present, most smart products are fragmented and do not work
together. As data are siloed in each product’s separate app.
• That will change in the future as devices grow more inter-
connected
10. Sounds nice, so what’s the problem?
The Johnny Depp access rights problem in ‘Transcendence’
With unlimited access to data, he could tell by Oxytocin, Dopamine
and other hormone levels that his wife was lying. With unlimited
access to data, he could see through her skin and though he was her
husband, her comment “that’s not right” underscores the ethical
nature of the challenge.
Identity theft and being locked out
Valid concerns if you have ever experienced your signature being
forged, your ATM PIN being used or your email account hacked!
Over-empowering governments
Most respondents off a survey do not believe the internet is safe,
not even if in the hands of their country’s government = top men
The malfunction concern
Security and mitigation systems lag behind front-end innovation
11. Learnings from the EU
The Data Protection Directive 95/46/EC:
• This is the reference text, at EU level, on the protection of
personal data, inspired by Council of Europe Convention 108/81
• It sets up a regulatory framework which seeks to strike a balance
between a high level of protection of individuals and the free
movement of personal data within the European Union
• It provides a high level of protection of personal data, regardless
of technologies used & sets limits on its collection and use
• It demands that each Member State set up an independent
national body responsible for the protection of these fundamental
concerns & it applies to both the public & private sectors.
12. Learnings from the EU
The roadmap for the review
– Public consultation (May-Dec 2009)
– Written input received: 150-200
– Commission reflection (Jan-Sept 2010)
– Stakeholder meetings, impact analysis
– Communication (November 2010)
– Consultation & additional feedback
– Commission proposal
– Co-decision of EP + Council
– Implementation, where necessary
13. Learnings from the US
• In a February 2014 speech, Commissioner Brill expressed
concern that data from devices—that consumers might not
even know are actually connected to the Internet—can be
combined with existing troves of data to make it even
easier to make sensitive predictions about consumers, such
as those involving their sexual orientation, health
conditions, religion and race
15. Learnings from China
China’s 5-year plan
• Understand the importance of the IoT
• Correctly get the general idea of the IoT
• Assign the local development task of the IoT
• Guide the development of the key projects of IoT
• Create favorable environment for the development of the IoT
• Create 10 clusters and more than 1,000 IoT firms
• Build a $100 Billion industry by 2020
16. Expected industry moves in 2015
• More ‘productized’ offerings. There will be many more platforms
and solutions enabling out-of-the-box connected devices
• Breakthroughs in smart city service deployments. 2015 will be
the year when we’ll see some real commercial success stories in
smart cities, especially from services that save money e.g. in
Street lighting
• Major OS and new startups will disrupt the connected car market
• Mobile gets a say: i-beacons and wearables to drive more
“connected-ness”
• Avatar concepts start getting real beyond ‘Second Life’ and
related games, e.g. a company called ‘Evrythng’
• Privacy and security. Issues of privacy and security will reach the
top of the agenda. The complexity of IoT solutions will require a
fresh, yet collaborative way of thinking about security.
Source: Machina research
18. Summary of valid concerns
• Threats to the Individual & to physical safety: planes, trains and
automobiles (Personal Injury/Property Damage)
• The changing face of identity theft: extends to the “things” that track
our behavior that can then be mal-used to threaten us personally.
• Infringement of IP, copyright, DRM and rights recognition & protection
• Physical & data insecurity
• Impacting of legal Compliance programs: consent to use data, privacy
policies, data breach notification, etc.
• Obscuring of Security Procedures via unauthorized remote
”experiments”
• Contractual Indemnity: the argument of ‘it’s a thing, not a person’
• Insurance fraud and self-inflicted damage
• Country distrust e.g. USA - France communication based on Wikileaks’
claims
19. We say NO to that ☺ ...it’s inevitable and already here. An easy 1st
step is that legislation mandates manufacturers of smart devices to:
• build security into devices from the outset, rather than as a
design afterthought
• train employees on the critical nature of security and when
outside service providers are engaged, those providers are
capable of maintaining reasonable security measures and
providing appropriate oversight
• when a security risk is identified, using a "defense-in-depth"
strategy whereby multiple layers of security may be used to
defend against the identified risk
• ignite measures to keep unauthorized users from attempting or
accessing a consumer's device, data, or personal information and
• monitoring connected devices throughout their expected life
cycle and providing security patches to cover known risks
So…do we say NO to IoT?
20. • Make a conscious effort to make proposals for regulation succinct,
discernible and follow/obey-able
• Avoid cut-and-paste regulation (Covey’s law: Seek first to understand…)
• Always be clear on whose side you are when launching new tech:
fairness, ethics, humanity, profits, did-it-first etc.
• Balance need for openness with the principle of a need-to-know
And finally, a word for the tech-savvy
…and our learned legal practitioners
• Expand your knowledge frontiers, ask more questions, demand
rendition in plain English (e.g. PIN use, identity theft, Social media use)
• Good news: there are sites designed to render complexities simply
• While not becoming complacent & abdicating this responsibility,
never forget this is a “difficult conversation” that must be had
21. “Seek first to understand, then be understood”
THANK YOU
22. Picture & data credits
• www.eecatalogue.com [smart-home setup]
• European Commission DG Justice
• Corporate immersion institute: China & the IoT
• https://www.oasis-open.org/committees/ubl
• http://www.w3.org/html/.
• www.fool.com
• https://www.oasis-open.org/committees/tc_cat.php?cat=cloud
• www.holistichosting.com
• www.ge.com
• Machinetomachine magazine
• www.comsoc.org/blog