SlideShare uma empresa Scribd logo
1 de 11
Regulation and the
Internet of Things
15th Global Symposium for
Regulators (GSR15)
Prof. Ian Brown
The views expressed in this presentation are those of the author and do not necessarily reflect the opinions of the ITU or its Membership.
DEFINITIONS
• ITU-T: “A global infrastructure for the information society,
enabling advanced services by interconnecting (physical and
virtual) things based on existing and evolving interoperable
information and communication technologies.”
• Concretely: remotely linked tags, sensors and actuators,
increasingly being built into objects throughout the physical
world, driven by ongoing rapid falls in the cost of microchips,
sensors and communications capacity.
• Protocols: NFC, RFID, medical implants, M2M dedicated
networks, ZigBee, Bluetooth, 2G/3G/4G, Wi-Fi, ITS
• Expectations that tens of billions of IoT devices deployed in next
decade, driving economic value in $trillions
POPULAR APPLICATIONS
Individual Society
GPS, Fitbits
Visa PayWave
Mastercard Paypass
Employee passes
Individual
person
Immediate friends/ family;
banks; employers
Mobile money
Fitness data, GPS
location-based data
Egs.
Smart Cities
Smart Grids
Community
IoT
Data
Intended
Audience
Smartphones
Wearables
Connected Cars
Health devices
Smart homes
GP, health authorities;
health & car insurance; Police
Wider friends, social networks
Authorities/regulators
Utility companies;
Other citizens
Smart metering;
Smart water meters
Traffic monitoring
Electricity/water
consumption & billing;
Traffic flow data
Intelligent Transport Systems Event
Data Recorders (EDRs)
Blood pressure monitors;
remote burglar/heating systems
Speed, distance, airbag, crash
locations/alerts;
Heart rate, blood pressure,
Diet; remote heating data
Level
DIVERSITY OF IOT APPLICATIONS
REGULATORY ISSUES
• Licensing and spectrum management
• Switching and roaming
• Addressing and numbering
• Competition
• Security and privacy
LICENSING AND SPECTRUM MANAGEMENT
Goal: Ensure spectrum is available for a wide range of IoT
applications, at short and long range, in licensed and unlicensed
bands.
Best practice: Monitor availability of spectrum for short and long-
range IoT communications and backhaul network capacity.
Encourage 4G deployment and use of small-cell technology.
Potential measures: Further experimentation with use of white
space and shared-space technology.
Encourage development of LTE-A and 5G networks, and keep need
for IoT-specific spectrum under review.
Source: ITU.
SWITCHING AND ROAMING
Goal: Encourage development of SIMs and mobile network
accounts suitable for large M2M users, roaming mobile devices, and
fixed devices in areas of poor reception.
Best practice: Mobile network operators develop M2M-specific
business units with appropriate billing and management.
Further development and deployment of embedded, remotely
provisioned SIMs in M2M systems.
Potential measures: Global agreement on updated E.212 standards,
making appropriate use of GSMA standards.
Provision of Mobile Network Codes to IoT service providers.
ADDRESSING AND NUMBERING
Goal: Large address space needed for globally addressable things
(although many IoT devices only need local connectivity).
Best practice: Deployment of IPv6 by ISPs, public and private sector
organisations.
Use of IMSI for M2M applications.
Potential measures: Universal IPv6 adoption by governments in
their own services and procurements, and other incentives for
private sector adoption.
COMPETITION
Goal: Avoid IoT user lock-in and new barriers to entry.
Best practice: Ensure competition regulators have capability to
monitor IoT markets for abuses of dominant positions.
Provide institutional mechanism for ongoing review of laws and
regulations for impact on IoT competitiveness.
Potential measures: Consider measures to increase interoperability
through competition and consumer law.
Give users a right to easy access to raw data.
Support global standardisation and deployment of remotely
provisioned SIMs for greater M2M competition.
SECURITY AND PRIVACY
Goal: Significantly reduce security vulnerabilities in IoT systems, which let attackers
access private data and cause physical harm in cases such as medical devices and
connected vehicles.
• Encourage security and vulnerability patching of devices.
• Smart city vulnerabilities can be hard to fix due to legacy systems, but present
significant safety issues (e.g. in traffic lights).
Ensure individual control of profiles, which can be used to infer sensitive personal
information, such as medical disorders.
Reduce potential for discrimination in employment, financial and healthcare services.
Best practice: Ensuring security and privacy from outset of IoT system design process.
Development of co-regulation by all stakeholders to protect security and privacy.
Further development of privacy and consumer protection rules to ensure security
testing of IoT systems that process sensitive personal data.
SECURITY AND PRIVACY - POTENTIAL MEASURES
• R&D on more hardware and software security and privacy mechanisms for
resource-constrained IoT systems, particularly targeted towards start-ups and
individual entrepreneurs that lack resources to easily develop this functionality.
• Incentives for companies to develop new mechanisms to improve transparency
of IoT personal data use, and for gaining informed consent from individuals
concerned when sensitive data is gathered or inferences drawn.
• Greater use of Privacy Impact Assessments by organisations building and
configuring IoT systems.
• Development of further guidance from global privacy regulators on application
of the principles of data minimisation and purpose limitation in IoT systems.
• More cooperation between telecoms and other regulators such as privacy/data
protection agencies.

Mais conteúdo relacionado

Mais procurados

Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityGlenn McKnight
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Business Finland
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peacePaul van Heel
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19Ahmed Banafa
 
Cyber trust: cornerstone of a digital world
Cyber trust: cornerstone of a digital worldCyber trust: cornerstone of a digital world
Cyber trust: cornerstone of a digital worldLeonardo
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain managementAhmed Banafa
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawRizkiawan Achadi
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawftii
 
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)TRPC Pte Ltd
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityCharles Mok
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmannsegughana
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ahmed Banafa
 
Border security: a physical and digital challenge
Border security: a physical and digital challengeBorder security: a physical and digital challenge
Border security: a physical and digital challengeLeonardo
 
Security and Privacy in Pegulated Environments
Security and Privacy in Pegulated EnvironmentsSecurity and Privacy in Pegulated Environments
Security and Privacy in Pegulated EnvironmentsFrancis Amaning
 
I4ADA 2019 - Presentation Jacques Kruse Brandao
I4ADA 2019 - Presentation  Jacques Kruse BrandaoI4ADA 2019 - Presentation  Jacques Kruse Brandao
I4ADA 2019 - Presentation Jacques Kruse BrandaoPaul van Heel
 
Singapore: Strong regulatory foundations for effective crisis management (Jon...
Singapore: Strong regulatory foundations for effective crisis management (Jon...Singapore: Strong regulatory foundations for effective crisis management (Jon...
Singapore: Strong regulatory foundations for effective crisis management (Jon...TRPC Pte Ltd
 
Cyber resilient infrastructure
Cyber resilient infrastructureCyber resilient infrastructure
Cyber resilient infrastructureAtkins
 

Mais procurados (20)

Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19
 
Cyber trust: cornerstone of a digital world
Cyber trust: cornerstone of a digital worldCyber trust: cornerstone of a digital world
Cyber trust: cornerstone of a digital world
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain management
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020
 
Border security: a physical and digital challenge
Border security: a physical and digital challengeBorder security: a physical and digital challenge
Border security: a physical and digital challenge
 
Security and Privacy in Pegulated Environments
Security and Privacy in Pegulated EnvironmentsSecurity and Privacy in Pegulated Environments
Security and Privacy in Pegulated Environments
 
I4ADA 2019 - Presentation Jacques Kruse Brandao
I4ADA 2019 - Presentation  Jacques Kruse BrandaoI4ADA 2019 - Presentation  Jacques Kruse Brandao
I4ADA 2019 - Presentation Jacques Kruse Brandao
 
Singapore: Strong regulatory foundations for effective crisis management (Jon...
Singapore: Strong regulatory foundations for effective crisis management (Jon...Singapore: Strong regulatory foundations for effective crisis management (Jon...
Singapore: Strong regulatory foundations for effective crisis management (Jon...
 
Cyber resilient infrastructure
Cyber resilient infrastructureCyber resilient infrastructure
Cyber resilient infrastructure
 

Semelhante a Regulation and Security of the Internet of Things (IoT

An Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdfAn Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdfCIOWomenMagazine
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019Ahmed Banafa
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
The Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsThe Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsParviz Iskhakov, PhD
 
The Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsThe Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsParviz Iskhakov
 
Internet of Things And Its Components.pptx
Internet of Things And Its Components.pptxInternet of Things And Its Components.pptx
Internet of Things And Its Components.pptxSoftxai
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018Ahmed Banafa
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfezzAyman1
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptxOdedeleIfeoluwa
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsDennis Jacob
 
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxThe-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxHadHic
 

Semelhante a Regulation and Security of the Internet of Things (IoT (20)

An Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdfAn Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdf
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
The Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsThe Digital Telecom. Internet of Things
The Digital Telecom. Internet of Things
 
The Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsThe Digital Telecom. Internet of Things
The Digital Telecom. Internet of Things
 
Internet of Things And Its Components.pptx
Internet of Things And Its Components.pptxInternet of Things And Its Components.pptx
Internet of Things And Its Components.pptx
 
Cellular Narrow Band IoT- using LTE
Cellular Narrow Band IoT- using LTE Cellular Narrow Band IoT- using LTE
Cellular Narrow Band IoT- using LTE
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
Future of Internet.pptx
Future of Internet.pptxFuture of Internet.pptx
Future of Internet.pptx
 
IoT
IoTIoT
IoT
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
 
IOT PPT.pptx
IOT PPT.pptxIOT PPT.pptx
IOT PPT.pptx
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
M2M_IoT_Presentation
M2M_IoT_PresentationM2M_IoT_Presentation
M2M_IoT_Presentation
 
lee2015.pdf
lee2015.pdflee2015.pdf
lee2015.pdf
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and Trends
 
Varun IOTs PPT
Varun  IOTs PPTVarun  IOTs PPT
Varun IOTs PPT
 
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxThe-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
 

Mais de blogzilla

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competitionblogzilla
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentblogzilla
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Bankingblogzilla
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Walesblogzilla
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policyblogzilla
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector datablogzilla
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Actblogzilla
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertiseblogzilla
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Electionsblogzilla
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managersblogzilla
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africablogzilla
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCblogzilla
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulationblogzilla
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centreblogzilla
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsblogzilla
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloudblogzilla
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?blogzilla
 

Mais de blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloud
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
 

Último

Expressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxExpressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxtsionhagos36
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceHigh Profile Call Girls
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...Suhani Kapoor
 
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Dipal Arora
 
Climate change and occupational safety and health.
Climate change and occupational safety and health.Climate change and occupational safety and health.
Climate change and occupational safety and health.Christina Parmionova
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxSwastiRanjanNayak
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfahcitycouncil
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxPeter Miles
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...tanu pandey
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)Congressional Budget Office
 
2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos WebinarLinda Reinstein
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...ResolutionFoundation
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxaaryamanorathofficia
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at workChristina Parmionova
 
Fair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTFair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTaccounts329278
 

Último (20)

Expressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxExpressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptx
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
 
The Federal Budget and Health Care Policy
The Federal Budget and Health Care PolicyThe Federal Budget and Health Care Policy
The Federal Budget and Health Care Policy
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
 
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
 
Climate change and occupational safety and health.
Climate change and occupational safety and health.Climate change and occupational safety and health.
Climate change and occupational safety and health.
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptx
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdf
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
How to Save a Place: 12 Tips To Research & Know the Threat
How to Save a Place: 12 Tips To Research & Know the ThreatHow to Save a Place: 12 Tips To Research & Know the Threat
How to Save a Place: 12 Tips To Research & Know the Threat
 
The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)
 
2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptx
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at work
 
Fair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CTFair Trash Reduction - West Hartford, CT
Fair Trash Reduction - West Hartford, CT
 

Regulation and Security of the Internet of Things (IoT

  • 1. Regulation and the Internet of Things 15th Global Symposium for Regulators (GSR15) Prof. Ian Brown The views expressed in this presentation are those of the author and do not necessarily reflect the opinions of the ITU or its Membership.
  • 2. DEFINITIONS • ITU-T: “A global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies.” • Concretely: remotely linked tags, sensors and actuators, increasingly being built into objects throughout the physical world, driven by ongoing rapid falls in the cost of microchips, sensors and communications capacity. • Protocols: NFC, RFID, medical implants, M2M dedicated networks, ZigBee, Bluetooth, 2G/3G/4G, Wi-Fi, ITS • Expectations that tens of billions of IoT devices deployed in next decade, driving economic value in $trillions
  • 3. POPULAR APPLICATIONS Individual Society GPS, Fitbits Visa PayWave Mastercard Paypass Employee passes Individual person Immediate friends/ family; banks; employers Mobile money Fitness data, GPS location-based data Egs. Smart Cities Smart Grids Community IoT Data Intended Audience Smartphones Wearables Connected Cars Health devices Smart homes GP, health authorities; health & car insurance; Police Wider friends, social networks Authorities/regulators Utility companies; Other citizens Smart metering; Smart water meters Traffic monitoring Electricity/water consumption & billing; Traffic flow data Intelligent Transport Systems Event Data Recorders (EDRs) Blood pressure monitors; remote burglar/heating systems Speed, distance, airbag, crash locations/alerts; Heart rate, blood pressure, Diet; remote heating data Level
  • 4. DIVERSITY OF IOT APPLICATIONS
  • 5. REGULATORY ISSUES • Licensing and spectrum management • Switching and roaming • Addressing and numbering • Competition • Security and privacy
  • 6. LICENSING AND SPECTRUM MANAGEMENT Goal: Ensure spectrum is available for a wide range of IoT applications, at short and long range, in licensed and unlicensed bands. Best practice: Monitor availability of spectrum for short and long- range IoT communications and backhaul network capacity. Encourage 4G deployment and use of small-cell technology. Potential measures: Further experimentation with use of white space and shared-space technology. Encourage development of LTE-A and 5G networks, and keep need for IoT-specific spectrum under review.
  • 7. Source: ITU. SWITCHING AND ROAMING Goal: Encourage development of SIMs and mobile network accounts suitable for large M2M users, roaming mobile devices, and fixed devices in areas of poor reception. Best practice: Mobile network operators develop M2M-specific business units with appropriate billing and management. Further development and deployment of embedded, remotely provisioned SIMs in M2M systems. Potential measures: Global agreement on updated E.212 standards, making appropriate use of GSMA standards. Provision of Mobile Network Codes to IoT service providers.
  • 8. ADDRESSING AND NUMBERING Goal: Large address space needed for globally addressable things (although many IoT devices only need local connectivity). Best practice: Deployment of IPv6 by ISPs, public and private sector organisations. Use of IMSI for M2M applications. Potential measures: Universal IPv6 adoption by governments in their own services and procurements, and other incentives for private sector adoption.
  • 9. COMPETITION Goal: Avoid IoT user lock-in and new barriers to entry. Best practice: Ensure competition regulators have capability to monitor IoT markets for abuses of dominant positions. Provide institutional mechanism for ongoing review of laws and regulations for impact on IoT competitiveness. Potential measures: Consider measures to increase interoperability through competition and consumer law. Give users a right to easy access to raw data. Support global standardisation and deployment of remotely provisioned SIMs for greater M2M competition.
  • 10. SECURITY AND PRIVACY Goal: Significantly reduce security vulnerabilities in IoT systems, which let attackers access private data and cause physical harm in cases such as medical devices and connected vehicles. • Encourage security and vulnerability patching of devices. • Smart city vulnerabilities can be hard to fix due to legacy systems, but present significant safety issues (e.g. in traffic lights). Ensure individual control of profiles, which can be used to infer sensitive personal information, such as medical disorders. Reduce potential for discrimination in employment, financial and healthcare services. Best practice: Ensuring security and privacy from outset of IoT system design process. Development of co-regulation by all stakeholders to protect security and privacy. Further development of privacy and consumer protection rules to ensure security testing of IoT systems that process sensitive personal data.
  • 11. SECURITY AND PRIVACY - POTENTIAL MEASURES • R&D on more hardware and software security and privacy mechanisms for resource-constrained IoT systems, particularly targeted towards start-ups and individual entrepreneurs that lack resources to easily develop this functionality. • Incentives for companies to develop new mechanisms to improve transparency of IoT personal data use, and for gaining informed consent from individuals concerned when sensitive data is gathered or inferences drawn. • Greater use of Privacy Impact Assessments by organisations building and configuring IoT systems. • Development of further guidance from global privacy regulators on application of the principles of data minimisation and purpose limitation in IoT systems. • More cooperation between telecoms and other regulators such as privacy/data protection agencies.