IoT_Policy
Overview
 Why is IOT Relevant
 Guidelines
 Samsung, Intel, & Nest IOT Strategy
Why is IOT
Relevant?
 What is the internet of things?
 Who are included?
 Why Protect?
 How to protect?
Guidelines
 Collecting Information
 Use of Information
 Storage
 Securing
Simband
Samsung IOT
Strategy
 IOTTechnology
 Simband
 Implementation of Simband within privacy policy
Intel IOT
Strategy
 RealsenseTechnology
 Intel’s Philosophy on Protecting Personal Information
 IOT Public Policy
NEST IOT
Strategy
 Nestaware/Nestcam
 Privacy Statement for Nest Products
Key Points
• BeTransparent
• IOT Policy
• Visibility
References
 http://www.voiceofthebody.io/about/privacy.htmlhttp://www.sam
sung.com/us/ssic/innovation_areas/
 http://www.voiceofthebody.io/simband/simband-documentation/
 http://www.intel.com/content/www/us/en/privacy/intel-
privacy.html
 http://www.intel.com/content/www/us/en/policy/policy-internet-
of-things-iot.html
 http://www.intel.com/content/www/us/en/internet-of-
things/videos/realsense-range-rover-features-video.html
 https://nest.com/support/article/How-does-Nest-Aware-improve-
Nest-Cam-s-sound-and-motion-detection

More Related Content

PPSX
Secure your public WiFi
PDF
George Delaportas - VEDICOR (Hacking CV)
PPTX
Computing on the Move - Mobile Security
PPTX
Incident response : the good the bad and the ugly or how to keep your face af...
DOCX
Chris Ward Short Bio and CV 2016 (1)
PDF
Cloud 101
PPTX
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Secure your public WiFi
George Delaportas - VEDICOR (Hacking CV)
Computing on the Move - Mobile Security
Incident response : the good the bad and the ugly or how to keep your face af...
Chris Ward Short Bio and CV 2016 (1)
Cloud 101
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7

Viewers also liked (20)

PPTX
IoT - IT 423 ppt
PPTX
Io t privacy and security considerations
PDF
IoT Policy and Regulatory Framework
PDF
Data Ownership & Trust in the IoT
PPTX
[IoT Tech Expo] Smart Cities – Leveraging Messaging from Project to City to ...
PPTX
The Prospect of IoT in the Oil & Gas
PDF
Effective Security Metrics
PDF
HP Iot platform and solution plans
PPTX
Security issues and solutions : IoT
PDF
IoT Security and Privacy Considerations
PPTX
IoT Standardization and Implementation Challenges
PDF
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
PPTX
IoT implementation and Challenges
PDF
Privacy, Drones, and IoT
PPTX
Key Data Management Requirements for the IoT
PPTX
KRI (Key Risk Indicators) & IT
PDF
IOT Factory - Open IOT Platform & Startup Studio
PDF
Big data and value creation
PDF
Cybersecurity in the Boardroom
PPTX
Importance of IoT in Retail
IoT - IT 423 ppt
Io t privacy and security considerations
IoT Policy and Regulatory Framework
Data Ownership & Trust in the IoT
[IoT Tech Expo] Smart Cities – Leveraging Messaging from Project to City to ...
The Prospect of IoT in the Oil & Gas
Effective Security Metrics
HP Iot platform and solution plans
Security issues and solutions : IoT
IoT Security and Privacy Considerations
IoT Standardization and Implementation Challenges
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT implementation and Challenges
Privacy, Drones, and IoT
Key Data Management Requirements for the IoT
KRI (Key Risk Indicators) & IT
IOT Factory - Open IOT Platform & Startup Studio
Big data and value creation
Cybersecurity in the Boardroom
Importance of IoT in Retail
Ad

Similar to IoT_Policy (20)

DOCX
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
PPTX
SC Congress Amsterdam 2016 - IoT Security
PDF
Internet of Things - Building a Smarter World
PPTX
Cisco Technology Radar
PDF
IoT Analytics From Data to Decision Making - Trends & Challenges
DOCX
Internet of Things (IoT) Patent Landscape and Innovation Leadership 4Q 2015
DOCX
Internet of Things (IoT) Patent Landscape and Innovation Leadership 4Q 2015
PPTX
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy 4...
PPTX
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
PPTX
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
PPTX
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
PDF
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
PDF
Internet of Things (IoT) Applications and Trends Malaysia 2022
PDF
IoT Security: Problems, Challenges and Solutions
PDF
Introduction to the Internet of Things
PPTX
IOT Roadmap - Adoption & Standardization
PDF
Internet of things_presentation_11_04_2021
PDF
How to Start Building Your IoT Application
PDF
Your Journey Towards Industry 4.0 with Internet of Things
PDF
Publish Ireland Future Internet St Eloff
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
SC Congress Amsterdam 2016 - IoT Security
Internet of Things - Building a Smarter World
Cisco Technology Radar
IoT Analytics From Data to Decision Making - Trends & Challenges
Internet of Things (IoT) Patent Landscape and Innovation Leadership 4Q 2015
Internet of Things (IoT) Patent Landscape and Innovation Leadership 4Q 2015
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy 4...
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Internet of Things (IoT) Applications and Trends Malaysia 2022
IoT Security: Problems, Challenges and Solutions
Introduction to the Internet of Things
IOT Roadmap - Adoption & Standardization
Internet of things_presentation_11_04_2021
How to Start Building Your IoT Application
Your Journey Towards Industry 4.0 with Internet of Things
Publish Ireland Future Internet St Eloff
Ad

IoT_Policy

Editor's Notes

  • #3: Why is IOT relevant Will be the answers to the purpose of IOT and how it relates to USDA and the Privacy office Guidelines Will consist of ways to implement a privacy policy for IOT Samsung, Intel, & Nest IOT Strategy - Will be a deeper look into what other companies are doing right now with the strategies that are being implemented with their IOT technologies and how they have created policies to explain their strategies
  • #4: What is the internet of things? IOT is a network of interconnected devices and these devices interact with people Who are included? Everyone is included within IOT, whether it is knowingly or not Why Protect? People are the primary concern of USDA privacy office Due to the privacy act of 1974, the privacy office must safeguard & protect the public’s PII How to protect? Use procedures for safeguarding and implement those procedures throughout training employees, contractors and other affiliates of USDA Create information workshops
  • #5: Guidelines - Will consist of ideas for consideration that should be accounted for when developing a privacy policy for IOT Collecting Information - Is Information automatically being collected what information is being collected from the user? Are users aware of this? Use of information Is the collected information being used? What purpose serves using the information? Who has control of the information? Storage Where is the data being stored? Does the User have access to the stored information? How long is the Information Stored? Securing How is the stored or real time data being secured? Will the information be protected from third-party intruders? Know the visibility of your information?
  • #7: IOT Technology Samsung’s strategy consists of technology that connects there in-home experiences, powering smart cities, protecting the environment and providing better health Simband Is there concept of what a digital health device should be Consists of a watch unit and a wristband connector that holds a custom sensor module The simband acts as a window into wearer Implementation of Simband within privacy policy Explains overview of policy, in regards to Personal Identifiably Information What information they collect about you, using their platform, & platform websites Explains whom they’ll disclose your information with Based on disclosures to certain third parties, and other special circumstances Explains automatically collected information and anonymous information
  • #8: Realsense technology - Makes sense of your vehicle surroundings for new, safety, security, and object detection features Profile recognition & Digital facial recognition are used to unlocks doors as well as lock doors. Safety features does not unlock the door for unauthorized profile Object recognition to avoid tough obstacles Intel’s Philosophy on Protecting Personal Information Limited Use Intel states that they will only use your personal information for the purpose they collected it. Ex: to improve your experience with products and services Limited Sharing Providing third parties only the amount of information that is needed to complete a service request Information security IOT Public Policy Includes a Background & key issues like, privacy and security, & Data and device discoverability
  • #9: Nestaware/Nestcam A google acquired company Nestaware can detect small or large items from a far as well as near objects Can detect motions that are swift, and it knows when to alert you of sucspicious activity. Ex: It knows the difference from trees blowing outside the window and a kitten. Can detect human faces to alert if an intruder is going to enter Privacy Statement for Nest Products The privacy statement for nest products and services describes information that NestLabs collect, use, share, and store, including personal information They have a pledge to be transparent, to ask your permission, and to use best-in-class data security tools Describes what information their products and services collect How is the information being used, shared, stored, and deleted
  • #10: Be Transparent To create a primary policy for IOT there should be a clear understanding of the product(s) or service(s) that may be used, and how that product(s) or service(s) will collect, use, secure, and store that data IOT Policy Many other companies have created philosophies, statements, or policies for their IOT service(s) or product(s) . Therefore those ideas should be taken in consideration Visibility - To create a privacy policy for IOT, there must be an understanding of the system’s visibility, therefore you must know a procedure for safeguarding personal information.