Join the conversation @iotconsortium
WELCOME
Join the conversation @iotconsortium
IoTC Privacy & Security Task Force
Task Force Objective - Privacy for Voice Activated Devices
§ Address impact to product manufacturers and consumers
§ Develop best practices and guidelines
§ Bridge the policymaker-industry-academic gap in privacy policy
§ Develop privacy protections, ethical norms and workable business practices
§ Create content for upcoming events, webinars and educational workshops
Mainstream adoption remains weighed by consumer concerns about how personal data will be collected, stored, or used.
IoTC members will shape industry growth by defining, adopting, and evangelizing a set of privacy best practices that meets
the needs of providers and consumers alike.Privacy & Security
What can the industry do?
§ Educate consumers and product manufacturers
§ Promote best practices
§ Drive initiatives among key industry stakeholders to educate & promote
Consumer education - How much do consumers understand?
§ How do I know what or when a device is listening?
§ Can I control when or what it listens to?
§ Can I manage or purge what is stored or analyzed?
§ What can be done with your data?
Product / Service Providers
§ What security policies and regulations am I subject to?
§ How will this effect my costs and user experience?
§ What functionality is required? Opt-in, Opt-out, other filters or configuration?
Join the conversation @iotconsortium
IoT Privacy & Security - Headline News
Sep 7, 2017
Equifax Hack: Huge Scale of Cyber
Attack Means That Many People Will
Have Had Personal Details Stolen
Without Knowing
Jul 10, 2017
Voice-activated device called 911
during attack, New Mexico
authorities say
Feb 28, 2017
A Murder Case Tests Alexa’s
Devotion to Your Privacy
Jan 3, 2017
Just How Dangerous is Alexa?
Dec 12, 2016
Quest Diagnostics says personal
health information of 34,000
customers hacked
Dec 12, 2016
The IoT threat to Privacy
IoTC - The Future of IoT Privacy & Security Task Force
IoTC - The Future of IoT Privacy & Security Task Force
IoTC - The Future of IoT Privacy & Security Task Force
IoTC - The Future of IoT Privacy & Security Task Force
•
•
•
•
•
•
•
Case Study: Microphones in IoT
Case Study: Microphones in IoT
Activation
Activation
•
•
•
•
DataTransmitted
Types of Data a Device Could Collect:
• Audible Noises (e.g. voices)
• Special ranges (e.g. ultrasonic)
• Audio Patterns (e.g. “gunshot”)
• Meta Data
IoTC - The Future of IoT Privacy & Security Task Force
IoTC - The Future of IoT Privacy & Security Task Force
•
•
•
•
•
•
•
•
•
•
•
•
•

More Related Content

PDF
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
PPTX
Towards Privacy by Design. Key issues to unlock science.
PDF
Advantages of privacy by design in IoE
PPTX
Privacy by design
PDF
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
PDF
Introduction to CSIRTs
PDF
BCS ITNow 201409 - What's Going On
PDF
Cloud security lessons learned and audit
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
Towards Privacy by Design. Key issues to unlock science.
Advantages of privacy by design in IoE
Privacy by design
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Introduction to CSIRTs
BCS ITNow 201409 - What's Going On
Cloud security lessons learned and audit

What's hot (20)

PDF
How secure are chat and webconf tools
PDF
Sleeping well with cloud services
PDF
IT Summit 2015 (IoT panel)
PDF
Kijiji 160616
PPT
Privacy in Wireless Networks
PPT
An open & sustainable internet of things
PPTX
Making the Case for Stronger Endpoint Data Visibility
PPTX
netwealth and Sense Of Security webinar: What you need to know about cyber se...
PDF
HIPAA Compliance: What you need to know
PDF
How Google Protects your Data
PDF
SOX: A Short Guide to Compliance
PPTX
Privacy by Design: White Papaer
PDF
Cybersecurity governance existing frameworks (nov 2015)
PDF
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
PDF
Business uses for blockchain
PPTX
Greenbone vulnerability assessment - Networkshop44
PDF
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
PPTX
Shadow IT: The CISO Perspective on Regaining Control
PPTX
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
PPTX
Cyber resilient infrastructure
How secure are chat and webconf tools
Sleeping well with cloud services
IT Summit 2015 (IoT panel)
Kijiji 160616
Privacy in Wireless Networks
An open & sustainable internet of things
Making the Case for Stronger Endpoint Data Visibility
netwealth and Sense Of Security webinar: What you need to know about cyber se...
HIPAA Compliance: What you need to know
How Google Protects your Data
SOX: A Short Guide to Compliance
Privacy by Design: White Papaer
Cybersecurity governance existing frameworks (nov 2015)
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Business uses for blockchain
Greenbone vulnerability assessment - Networkshop44
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Shadow IT: The CISO Perspective on Regaining Control
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Cyber resilient infrastructure
Ad

Similar to IoTC - The Future of IoT Privacy & Security Task Force (20)

PPTX
Privacy & Data Ethics
PDF
TLabs - deutsche telekom
PPTX
Information security: importance of having defined policy & process
PPTX
BYOD: Beating IT’s Kobayashi Maru
PDF
BYOD: Device Control in the Wild, Wild, West
PPTX
INTERNET OF THINGS ENGINEERING 2ND YEARS
PPTX
INTERNET OF THINGS ENGINEERING 2ND YEARS
PDF
Internet of Things With Privacy in Mind
PDF
Sensor Network Methodologies For Smart Applications Salahddine Krit
PPTX
A guide to Sustainable Cyber Security
PPTX
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
PDF
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
PDF
IoT PPT Deck
PPT
Life After Compliance march 2010 v2
PPSX
The 5 ws of Cyber Security
PPTX
Privacy for tech startups
PDF
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...
PDF
2. Enterprise and Business Architecture Cloud Video Data
PDF
The Web Analyst's Code of Ethics
PDF
NTXISSACSC3 - Security at the Point of Storage by Todd Barton
Privacy & Data Ethics
TLabs - deutsche telekom
Information security: importance of having defined policy & process
BYOD: Beating IT’s Kobayashi Maru
BYOD: Device Control in the Wild, Wild, West
INTERNET OF THINGS ENGINEERING 2ND YEARS
INTERNET OF THINGS ENGINEERING 2ND YEARS
Internet of Things With Privacy in Mind
Sensor Network Methodologies For Smart Applications Salahddine Krit
A guide to Sustainable Cyber Security
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
IoT PPT Deck
Life After Compliance march 2010 v2
The 5 ws of Cyber Security
Privacy for tech startups
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...
2. Enterprise and Business Architecture Cloud Video Data
The Web Analyst's Code of Ethics
NTXISSACSC3 - Security at the Point of Storage by Todd Barton
Ad

Recently uploaded (20)

PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PDF
simpleintnettestmetiaerl for the simple testint
PPT
12 Things That Make People Trust a Website Instantly
PDF
Containerization lab dddddddddddddddmanual.pdf
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PDF
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PDF
Course Overview and Agenda cloud security
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PDF
The Evolution of Traditional to New Media .pdf
PPTX
TITLE DEFENSE entitle the impact of social media on education
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PPTX
The-Importance-of-School-Sanitation.pptx
PPTX
Introduction to cybersecurity and digital nettiquette
PDF
Understand the Gitlab_presentation_task.pdf
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
simpleintnettestmetiaerl for the simple testint
12 Things That Make People Trust a Website Instantly
Containerization lab dddddddddddddddmanual.pdf
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
Course Overview and Agenda cloud security
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
AI_Cyberattack_Solutions AI AI AI AI .pptx
Mathew Digital SEO Checklist Guidlines 2025
The Evolution of Traditional to New Media .pdf
TITLE DEFENSE entitle the impact of social media on education
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
The-Importance-of-School-Sanitation.pptx
Introduction to cybersecurity and digital nettiquette
Understand the Gitlab_presentation_task.pdf

IoTC - The Future of IoT Privacy & Security Task Force

  • 1. Join the conversation @iotconsortium WELCOME
  • 2. Join the conversation @iotconsortium IoTC Privacy & Security Task Force Task Force Objective - Privacy for Voice Activated Devices § Address impact to product manufacturers and consumers § Develop best practices and guidelines § Bridge the policymaker-industry-academic gap in privacy policy § Develop privacy protections, ethical norms and workable business practices § Create content for upcoming events, webinars and educational workshops Mainstream adoption remains weighed by consumer concerns about how personal data will be collected, stored, or used. IoTC members will shape industry growth by defining, adopting, and evangelizing a set of privacy best practices that meets the needs of providers and consumers alike.Privacy & Security What can the industry do? § Educate consumers and product manufacturers § Promote best practices § Drive initiatives among key industry stakeholders to educate & promote Consumer education - How much do consumers understand? § How do I know what or when a device is listening? § Can I control when or what it listens to? § Can I manage or purge what is stored or analyzed? § What can be done with your data? Product / Service Providers § What security policies and regulations am I subject to? § How will this effect my costs and user experience? § What functionality is required? Opt-in, Opt-out, other filters or configuration?
  • 3. Join the conversation @iotconsortium IoT Privacy & Security - Headline News Sep 7, 2017 Equifax Hack: Huge Scale of Cyber Attack Means That Many People Will Have Had Personal Details Stolen Without Knowing Jul 10, 2017 Voice-activated device called 911 during attack, New Mexico authorities say Feb 28, 2017 A Murder Case Tests Alexa’s Devotion to Your Privacy Jan 3, 2017 Just How Dangerous is Alexa? Dec 12, 2016 Quest Diagnostics says personal health information of 34,000 customers hacked Dec 12, 2016 The IoT threat to Privacy
  • 13. DataTransmitted Types of Data a Device Could Collect: • Audible Noises (e.g. voices) • Special ranges (e.g. ultrasonic) • Audio Patterns (e.g. “gunshot”) • Meta Data