Alicia McKnight and Brian Finch urge energy industry players to evaluate cybersecurity risks posed by increasingly interconnected and internet-enabled power grids in an article which was published in the latest edition of Pratt’s Privacy & Cybersecurity Law Report.
Articles Posted in Internet of Things (IoT)
For Smart Home Technology, Contract Is Key
In our previous post we discussed the importance of conducting a thorough due diligence and procurement process with smart technology providers. Next up? The contract.
The price of a procured product is always important, but equally important are other contractual terms that reflect the commercial agreement. Ultimately, the contract should answer the fundamental question of “What are you buying?” The product itself is not the only feature being purchased. A customer is also buying certainty, service performance, risk mitigation, flexibility, security, compliance, and other similar “intangible” items of value.
Smart Technology in Commercial Real Estate
“Hey Siri…” “Alexa…” “Okay Google…” These are just some of the buzzwords and phrases that have entered day-to-day vocabulary as a result of the explosion of smart technology. Internet of Things (IoT) devices are in our cars, in our workplaces and on our bodies. But nowhere is smart technology more prevalent than in our homes. The array of services that are available coupled with the growing number of companies and service providers eager to innovate, should only grow this technology’s market share in the coming years.
Employee Surveillance, Worker Productivity and Privacy in the Wake of COVID-19
I am not at all embarrassed to admit that I love working in my pajamas. A lot of us are working from home now to help flatten the curve, and while social distancing has created a lot of challenges for most people, one of the perks is the ability to socially distance yourself from your hairbrush and roll into the office in your sweatpants. I don’t think I’m alone on this. According to one survey, 60% of office professionals report a better work-life balance when working from home, and 74% of workers would like to telecommute more often after social distancing restrictions are lifted. Not coincidentally, the widescale adoption of telecommuting has resulted in a corresponding uptick in employee monitoring tools.
Can the Blockchain Address the Vulnerabilities that Lurk Alongside the Potential of 5G?
With great power comes great responsibility. 5G is the next generation of 3GPP technology. Along with having the potential to facilitate the next leap in connectivity, 5G technology supremacy also has the power to define the geopolitics of the next century. As the global battle for 5G dominance plays out, companies are driving hard to secure coveted Standard Essential Patents (SEPs) encompassing 5G technology. The victor will secure substantial revenue and money flow in the form of patent royalties.
News of Note for the Internet-Minded (11/12/19) – AI Biases, Deepfake Policies and Millions of Medical Records
Apple gets around to AR, the NHL enters esports, the Internet of Things may bring new meaning to “workers unite,” so many medical records, and more …
Be Careful that Bot Doesn’t Come Back to Bite You
Much like humans, bots come in all shapes and sizes. In social media networks, these bots can like what you post and even increase your followers. Companies use bots for all types of things—from booking a ride to giving makeup tutorials. Some bots can even solve your legal problems. Besides saving time and money, bots have the potential to reduce errors and increase a business’s customer base. But what happens when bots spy on users and share personal information? Or when they make racial slurs and offensive comments?
News of Note for the Internet-Minded – 1/31/18 – Bots, ’Bots and More Bots
Bots get purged, bots hijack the IoT, bots come to your emotional rescue and more! (There is some non-bot news, as well.)
Keeping Up with Cayla: Concerns over Interactive Toys Spur an FTC Update of COPPA Guidelines
“Pleeeease?!” Buying a quick gift or giving in to your child’s pleas for a new toy is quickly becoming a more serious decision. In the age where toys can happily entertain kids by talking to them, the few precious moments those toys buy parents may not be without risk. It’s possible for anyone within an internet-connected toy’s Bluetooth range to connect to the toy and receive their audio recordings, while being up to 100 feet away. For example, in December 2015, VTech allegedly exposed the personal information of 6.4 million children, which included their names, genders and birthdays. Stealing a child’s personal information is, at the very least, concerning. However internet-connected toys come with an additional danger—localized hacking. Just look at Cayla, an internet-connected fashion doll manufactured and sold by Genesis Toys. My Friend Cayla answers fact-based questions, plays games, reads stories, and even solves math problems. Genesis uses third-party voice-recognition software by U.S.- based company, and the doll requires an iOS/Android application to use the software. The doll’s mobile application researches and supplies Cayla with factual answers to questions, but it also prompts children to set their physical location, parents’ names and school name.