Privacy, Drones, and IoT
Laura Vivet
Lawyer, CIPP/E/US
June 2016
What is Privacy?
Different Meanings & Regulations Worldwide
• Has Omnibus Data Protection Law
• Omnibus Law in Proces
• No Law or Sectorial Coverage Only
Privacy in the
United States
1. Sectorial approach
2. “Right to be left alone”
3. Multiple definitions of personal data or
sensitive data:
• Common law
• Federal and state laws
• FTC consent decrees
unfair and deceptive practices
Common Law
Kyllo vs United States
Federal & State Laws
What is covered? Risk
FCRA Applies to CRA
Limits the use of consumer reports
Protects consumer reports (any information
pertaining to 7 factors)
Civil/criminal penalties
Damages
Private right of action
COPPA Operators of commercial websites/online
services directed to children <13
Places parents in control
PII = name, SSN, video, audio, geolocation,
cookies, etc
Civil penalties (up to $16,000
per violation)
Damages
Reputation
GLBA Applies to financial domestic institutions
Addresses privacy & security
NPI
Civil penalties up to $1 1M
Private right of action 

in some states
HIPPA Covers health related entities
Protects health information
PHI
Civil/criminal penalties
Fines up to $250 000
• Unfair acts and deceptive practices
• PII/Sensitive information: name, etc; consumer data linked to a
specific consumer, computer or device; live feeds
• RISK: Up to $100 M. Other requirements: security measures,

training programs, disclosures, etc.
FTC consent decrees
Privacy, Drones, and IoT
Privacy in Europe
• Comprehensive approach
• Fundamental right (Art. 8 CFR)
• Directive 95/46/EC —> GDPR
• Enforcement: Independent DPA in each MS
• Other Privacy provisions: E-commerce,
telecommunications, health information
• “Personal data”: road definition
• Applies to any entity, public or private
• Processing of PD —> Anything!
• Extraterritorial scope —> Applicable outside EU!
• Exceptions
• RISK: Up to €20 M or 4% total

worldwide annual turnover
In Europe
everything is
forbidden
unless
allowed.
United States ≠ Europe
In United States
everything is
allowed
unless
forbidden.
• Between US and EU
• Co-regulatory framework
• “Personal data”: Broad definition
• Public Sector —> Privacy Act
• Private Sector —> PIPEDA (+ AL, BC, QB)
• Enforcement: Independent DPAs
• Statutory torts, anti spam, criminal code, etc
RISK
• 2015: enalties $17,800
• Data breach < $100,000
• Anti spam: ivil/criminal < $10M
Privacy in Canada
Drones
Drones & Privacy

in the United States
Key concepts:

“Reasonable expectation

of privacy” and the limits of

“private property”

No federal law addresses privacy
Tools:
• Common Law
• State & local regulations
• Voluntary Best Practices UAS
Common Law
Causby vs United States
State & Local Regulations
(some examples)
California
Responds to the
use of UAS by
the paparazzi
Florida
Protects
against
surveillance
activities
Arkansas
Prohibits the
use of UAS
to commit
voyeurism
New Hampshire
Conduct video
surveillance of
citizens who are
lawfully hunting,
fishing or trapping
• NTIA Multistakeholder rocess

(May 18, 2016)
• Commercial and private
• Private industry and privacy
advocates
• Privacy and security
• US DHS Best Practices in UAS
Programs (December 18, 2015)
• DHS and local, state and federal
government
• Privacy and security
Voluntary Best Practices UAS
Drones & Privacy by Design
What is covered? Risk
GDPR Commercial operations
Government operations (except outside scope
of Union law)
Up to €20 M or 4% total
worldwide annual turnover
Member
States
Laws
Household activity (hobbyists)
Freedom of expression and information
Outside scope of Union Law: Public security,
defense
Civil/criminal penalties
Damages
Drones and Privacy in the EU
The Internet of Things (IoT)
IoT creates 3
kinds of risk:
• Malfunction
• Hacking
• Privacy and security
can create economic
harm
Internet of Things Risk
Factors that shape
the risk equation:
• Vulnerability
• Intent
• Consequences
Metrics to assess
IoT risk:
• Value and sensitivity
of the data
• Criticality of a
function
• Scalability of failure
Measures
• Autonomy
• Authentication and
ncryption
• Differentiate important
vs unimportant and
define criticality
• Consider failure
• Critical systems not
linked to the internet
Minimize Risks for the IoT
Problems
• Limited ability to patch
& update software
• Management
difficulties
• Computing resources
limited on IoT devices
• Cost and complexity
• Wireless
Risk is dynamic
Will be greatest for the 1st generation of IoT devices
Identify and minimize privacy risks
Privacy Impact Assessment
General Steps
1 Describe the project
2 Describe the information lifecycle
3 Identify privacy and related risks
4 Identify and evaluate privacy solutions
5 Integrate PIA solutions into the project plan
References
Daniel Solve, “Privacy Law Fundamentals”, 2013, IAPP https://iapp.org/news/a/iapp-books/
DLI Piper, “Data Protection Laws of the World”, June 28, 2016 https://www.dlapiperdataprotection.com/#handbook/world-map-section
Federal Trade Commission, “Protecting Consumer Privacy in an Era of Rapid Change”, FTC Report, March 2012

https://www.ftc.gov/sites/default/files/documents/reports/federal-trade-commission-report-protecting-consumer-privacy-era-rapid-change-recommendations/
120326privacyreport.pdf
European Charter of Fundamental Rights http://www.europarl.europa.eu/charter/pdf/text_en.pdf
General Data protection Regulation (GDPR) http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679&from=EN
Current UAS Landscape, NCSL http://www.ncsl.org/research/transportation/current-unmanned-aircraft-state-law-landscape.aspx
Department of Homeland Security, Best Practices re UA, onlineS https://www.dhs.gov/sites/default/files/publications/UAS%20Best%20Practices.pdf
NTIA Multistakeholder Process re commercial and private UAS,

https://www.ntia.doc.gov/other-publication/2016/multistakeholder-process-unmanned-aircraft-systems
James Andrew Lewis, “Managing Risk for the Internet of Things”, CSIS, February 2016.

https://www.csis.org/analysis/managing-risk-internet-things
Michael Garcia, Naomi Lefkovitz, Suzanne Lightman, “Privacy Risk Management for Federal Information Systems”, NIST, May 2015

http://csrc.nist.gov/publications/drafts/nistir-8062/nistir_8062_draft.pdf
M-03-22, OMB Guidance for Implementing the Privacy Provisions of the E-Government Act of 2002

https://www.whitehouse.gov/omb/memoranda_m03-22
Canada, Privacy Impact Assessment: http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=18308
Art. 29 WP, Opinion 7/2013 on the Data Protection Impact Assessment Template for Smart Grid and Smart Metering System

http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2013/wp209_en.pdf
ICO, Privacy Impact Assessment Code of Practice, UK, online: https://ico.org.uk/media/for-organisations/documents/1595/pia-code-of-practice.pdf
References
Map	of	Israelite	Camp:

http://emp.byui.edu/satterfieldb/Tabernacle/TabernacleCampIsrael.html	
Different	meanings	and	regulations	worldwide:

https://iapp.org	
FTC	and	TrendNet	settle	claim	over	hacked	security	cameras,	CNET:

http://www.cnet.com/news/ftc-and-trendnet-settle-claim-over-hacked-security-cameras/		
Drones:

http://www.suasnews.com/2014/10/drones-fly-into-south-park-episode/		
Common	Law	Causby	vs	United	States:

http://www.thehappychickencoop.com/a-history-of-chickens/		
Drones	and	PbD:

http://www.dezeen.com/2014/10/30/ambulance-drone-alec-momont-emergency-uav-tu-delft/		
Internet	of	Things:

http://www.computerweekly.com/news/4500260406/Top-10-internet-of-things-stories-of-2015		
Risk	is	dynamic,	it	will	be	greatest	for	the	first	generation	of	IoT	devices:	

http://blog.orbitahealth.com/bebaio/8-iot-cartoons-that-will-add-some-humor-to-your-day
Thank you!
Laura Vivet
www.lauravivet.com ı lv@lauravivet.com

More Related Content

PPTX
Data Protection & Risk Management
PPTX
Social Media & Legal Risk
PPTX
Cyber Banking Conference
PPTX
Data Privacy for Information Security Professionals Part 1
PPT
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
PDF
Privacy and Data Security
PDF
Internetregulationjapan
PPTX
Privacy law and policy 2 - LIS550
Data Protection & Risk Management
Social Media & Legal Risk
Cyber Banking Conference
Data Privacy for Information Security Professionals Part 1
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Privacy and Data Security
Internetregulationjapan
Privacy law and policy 2 - LIS550

What's hot (20)

PPTX
Privacy & the Internet: An Overview of Key Issues
PDF
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
PPTX
What every product manager needs to know about online privacy
PPT
Legal & moral issues in e commerce
PPT
“Privacy Today” Slide Presentation
PPTX
The GDPR for Techies
PPTX
Unit 6 Privacy and Data Protection 8 hr
DOCX
Review questions
PPTX
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...
PPTX
Privacy & Data Protection
PPTX
GDPR Is Coming – Are Emailers Ready?
PPTX
Current Privacy and Data Issues (for people who care about open data!)
PPTX
Chapter 3
PPT
Websites: do you tick all the boxes?
PPT
Consumer Privacy
PPTX
The Internet State Filter
PPTX
Thierer Internet Privacy Regulation
PPTX
Digital law
PPTX
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
PDF
Internet Law 2014 - Presentation at CalBar IP Institute
Privacy & the Internet: An Overview of Key Issues
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
What every product manager needs to know about online privacy
Legal & moral issues in e commerce
“Privacy Today” Slide Presentation
The GDPR for Techies
Unit 6 Privacy and Data Protection 8 hr
Review questions
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...
Privacy & Data Protection
GDPR Is Coming – Are Emailers Ready?
Current Privacy and Data Issues (for people who care about open data!)
Chapter 3
Websites: do you tick all the boxes?
Consumer Privacy
The Internet State Filter
Thierer Internet Privacy Regulation
Digital law
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
Internet Law 2014 - Presentation at CalBar IP Institute
Ad

Viewers also liked (20)

PDF
IoT Security and Privacy Considerations
PPTX
Automatski - The Internet of Things - Privacy in IoT
PDF
IoT: Security & Privacy at IGNITE 2015
PDF
Overview of IoT and Security issues
PPT
IoT security (Internet of Things)
PPT
Internet of Things and its applications
PPTX
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
PPTX
IoT - IT 423 ppt
PDF
Iot Security and Privacy at Scale
PDF
WP-Privacy-IoT-Era - PRODUCTION
PDF
CRS R42701 Drones in Domestic Surveillance Operations Fourth Amendment Impli...
PPTX
Drones and The Practice of Real Estate
DOCX
Thesis
PDF
RoboCop World
PPTX
Drones and the Municipal Market
PDF
Surveillance
PDF
Kernel Recipes 2015 - The Dronecode Project – A step in open source drones
PPTX
Brussels Privacy Hub: SATORI and iTRACK
PDF
StuartMillar_13616005_PIA
PPTX
Privacy in Computing - Impact on emerging technologies
IoT Security and Privacy Considerations
Automatski - The Internet of Things - Privacy in IoT
IoT: Security & Privacy at IGNITE 2015
Overview of IoT and Security issues
IoT security (Internet of Things)
Internet of Things and its applications
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
IoT - IT 423 ppt
Iot Security and Privacy at Scale
WP-Privacy-IoT-Era - PRODUCTION
CRS R42701 Drones in Domestic Surveillance Operations Fourth Amendment Impli...
Drones and The Practice of Real Estate
Thesis
RoboCop World
Drones and the Municipal Market
Surveillance
Kernel Recipes 2015 - The Dronecode Project – A step in open source drones
Brussels Privacy Hub: SATORI and iTRACK
StuartMillar_13616005_PIA
Privacy in Computing - Impact on emerging technologies
Ad

Similar to Privacy, Drones, and IoT (20)

PPT
Drones and privacy 3 19-14
PPTX
Lily lim data privacy ownership and ethics
PPTX
Internet of Things TCLG Oct 23 2014
PDF
Ian walden - data protection in cloud computing
PDF
IoT PPT Deck
PPTX
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
PDF
Data Privacy of the Internet of Things
PDF
Clarke. nb. PRIVATE EYES. privacy and suveillance
PPTX
Mobile Devices and Internet of Things
PDF
Iot tunisia forum 2017 security, confidentiality and privacy in iot
PDF
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
PDF
Privacy & Security for the Internet of Things
PPTX
Tim Willoughby - Presentation to Innovation Masters 2016
PDF
Crenshaw - License Plates for Drones Presentation
PPTX
Customers in the cloud pulse final
PDF
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
PPTX
Multimedia Privacy
DOCX
I’m attaching some info on the agency I work for. I work remot.docx
PDF
Privacy in a Digital age
PPTX
How your nonprofit can avoid data breaches and ensure privacy
Drones and privacy 3 19-14
Lily lim data privacy ownership and ethics
Internet of Things TCLG Oct 23 2014
Ian walden - data protection in cloud computing
IoT PPT Deck
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
Data Privacy of the Internet of Things
Clarke. nb. PRIVATE EYES. privacy and suveillance
Mobile Devices and Internet of Things
Iot tunisia forum 2017 security, confidentiality and privacy in iot
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Privacy & Security for the Internet of Things
Tim Willoughby - Presentation to Innovation Masters 2016
Crenshaw - License Plates for Drones Presentation
Customers in the cloud pulse final
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
Multimedia Privacy
I’m attaching some info on the agency I work for. I work remot.docx
Privacy in a Digital age
How your nonprofit can avoid data breaches and ensure privacy

Recently uploaded (20)

PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
August Patch Tuesday
PDF
Architecture types and enterprise applications.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Hybrid model detection and classification of lung cancer
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Five Habits of High-Impact Board Members
PDF
Unlock new opportunities with location data.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPT
Geologic Time for studying geology for geologist
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
CloudStack 4.21: First Look Webinar slides
O2C Customer Invoices to Receipt V15A.pptx
A comparative study of natural language inference in Swahili using monolingua...
August Patch Tuesday
Architecture types and enterprise applications.pdf
Chapter 5: Probability Theory and Statistics
Developing a website for English-speaking practice to English as a foreign la...
Hybrid model detection and classification of lung cancer
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Five Habits of High-Impact Board Members
Unlock new opportunities with location data.pdf
Enhancing emotion recognition model for a student engagement use case through...
Web Crawler for Trend Tracking Gen Z Insights.pptx
Final SEM Unit 1 for mit wpu at pune .pptx
Geologic Time for studying geology for geologist
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
A contest of sentiment analysis: k-nearest neighbor versus neural network
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Module 1.ppt Iot fundamentals and Architecture
CloudStack 4.21: First Look Webinar slides

Privacy, Drones, and IoT

  • 1. Privacy, Drones, and IoT Laura Vivet Lawyer, CIPP/E/US June 2016
  • 3. Different Meanings & Regulations Worldwide • Has Omnibus Data Protection Law • Omnibus Law in Proces • No Law or Sectorial Coverage Only
  • 4. Privacy in the United States 1. Sectorial approach 2. “Right to be left alone” 3. Multiple definitions of personal data or sensitive data: • Common law • Federal and state laws • FTC consent decrees unfair and deceptive practices
  • 5. Common Law Kyllo vs United States
  • 6. Federal & State Laws What is covered? Risk FCRA Applies to CRA Limits the use of consumer reports Protects consumer reports (any information pertaining to 7 factors) Civil/criminal penalties Damages Private right of action COPPA Operators of commercial websites/online services directed to children <13 Places parents in control PII = name, SSN, video, audio, geolocation, cookies, etc Civil penalties (up to $16,000 per violation) Damages Reputation GLBA Applies to financial domestic institutions Addresses privacy & security NPI Civil penalties up to $1 1M Private right of action 
 in some states HIPPA Covers health related entities Protects health information PHI Civil/criminal penalties Fines up to $250 000
  • 7. • Unfair acts and deceptive practices • PII/Sensitive information: name, etc; consumer data linked to a specific consumer, computer or device; live feeds • RISK: Up to $100 M. Other requirements: security measures,
 training programs, disclosures, etc. FTC consent decrees
  • 9. Privacy in Europe • Comprehensive approach • Fundamental right (Art. 8 CFR) • Directive 95/46/EC —> GDPR • Enforcement: Independent DPA in each MS • Other Privacy provisions: E-commerce, telecommunications, health information • “Personal data”: road definition • Applies to any entity, public or private • Processing of PD —> Anything! • Extraterritorial scope —> Applicable outside EU! • Exceptions • RISK: Up to €20 M or 4% total
 worldwide annual turnover
  • 10. In Europe everything is forbidden unless allowed. United States ≠ Europe In United States everything is allowed unless forbidden.
  • 11. • Between US and EU • Co-regulatory framework • “Personal data”: Broad definition • Public Sector —> Privacy Act • Private Sector —> PIPEDA (+ AL, BC, QB) • Enforcement: Independent DPAs • Statutory torts, anti spam, criminal code, etc RISK • 2015: enalties $17,800 • Data breach < $100,000 • Anti spam: ivil/criminal < $10M Privacy in Canada
  • 13. Drones & Privacy
 in the United States Key concepts:
 “Reasonable expectation
 of privacy” and the limits of
 “private property”
 No federal law addresses privacy Tools: • Common Law • State & local regulations • Voluntary Best Practices UAS
  • 14. Common Law Causby vs United States
  • 15. State & Local Regulations (some examples) California Responds to the use of UAS by the paparazzi Florida Protects against surveillance activities Arkansas Prohibits the use of UAS to commit voyeurism New Hampshire Conduct video surveillance of citizens who are lawfully hunting, fishing or trapping
  • 16. • NTIA Multistakeholder rocess
 (May 18, 2016) • Commercial and private • Private industry and privacy advocates • Privacy and security • US DHS Best Practices in UAS Programs (December 18, 2015) • DHS and local, state and federal government • Privacy and security Voluntary Best Practices UAS
  • 17. Drones & Privacy by Design
  • 18. What is covered? Risk GDPR Commercial operations Government operations (except outside scope of Union law) Up to €20 M or 4% total worldwide annual turnover Member States Laws Household activity (hobbyists) Freedom of expression and information Outside scope of Union Law: Public security, defense Civil/criminal penalties Damages Drones and Privacy in the EU
  • 19. The Internet of Things (IoT)
  • 20. IoT creates 3 kinds of risk: • Malfunction • Hacking • Privacy and security can create economic harm Internet of Things Risk Factors that shape the risk equation: • Vulnerability • Intent • Consequences Metrics to assess IoT risk: • Value and sensitivity of the data • Criticality of a function • Scalability of failure
  • 21. Measures • Autonomy • Authentication and ncryption • Differentiate important vs unimportant and define criticality • Consider failure • Critical systems not linked to the internet Minimize Risks for the IoT Problems • Limited ability to patch & update software • Management difficulties • Computing resources limited on IoT devices • Cost and complexity • Wireless
  • 22. Risk is dynamic Will be greatest for the 1st generation of IoT devices
  • 23. Identify and minimize privacy risks Privacy Impact Assessment General Steps 1 Describe the project 2 Describe the information lifecycle 3 Identify privacy and related risks 4 Identify and evaluate privacy solutions 5 Integrate PIA solutions into the project plan
  • 24. References Daniel Solve, “Privacy Law Fundamentals”, 2013, IAPP https://iapp.org/news/a/iapp-books/ DLI Piper, “Data Protection Laws of the World”, June 28, 2016 https://www.dlapiperdataprotection.com/#handbook/world-map-section Federal Trade Commission, “Protecting Consumer Privacy in an Era of Rapid Change”, FTC Report, March 2012
 https://www.ftc.gov/sites/default/files/documents/reports/federal-trade-commission-report-protecting-consumer-privacy-era-rapid-change-recommendations/ 120326privacyreport.pdf European Charter of Fundamental Rights http://www.europarl.europa.eu/charter/pdf/text_en.pdf General Data protection Regulation (GDPR) http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679&from=EN Current UAS Landscape, NCSL http://www.ncsl.org/research/transportation/current-unmanned-aircraft-state-law-landscape.aspx Department of Homeland Security, Best Practices re UA, onlineS https://www.dhs.gov/sites/default/files/publications/UAS%20Best%20Practices.pdf NTIA Multistakeholder Process re commercial and private UAS,
 https://www.ntia.doc.gov/other-publication/2016/multistakeholder-process-unmanned-aircraft-systems James Andrew Lewis, “Managing Risk for the Internet of Things”, CSIS, February 2016.
 https://www.csis.org/analysis/managing-risk-internet-things Michael Garcia, Naomi Lefkovitz, Suzanne Lightman, “Privacy Risk Management for Federal Information Systems”, NIST, May 2015
 http://csrc.nist.gov/publications/drafts/nistir-8062/nistir_8062_draft.pdf M-03-22, OMB Guidance for Implementing the Privacy Provisions of the E-Government Act of 2002
 https://www.whitehouse.gov/omb/memoranda_m03-22 Canada, Privacy Impact Assessment: http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=18308 Art. 29 WP, Opinion 7/2013 on the Data Protection Impact Assessment Template for Smart Grid and Smart Metering System
 http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2013/wp209_en.pdf ICO, Privacy Impact Assessment Code of Practice, UK, online: https://ico.org.uk/media/for-organisations/documents/1595/pia-code-of-practice.pdf
  • 25. References Map of Israelite Camp:
 http://emp.byui.edu/satterfieldb/Tabernacle/TabernacleCampIsrael.html Different meanings and regulations worldwide:
 https://iapp.org FTC and TrendNet settle claim over hacked security cameras, CNET:
 http://www.cnet.com/news/ftc-and-trendnet-settle-claim-over-hacked-security-cameras/ Drones:
 http://www.suasnews.com/2014/10/drones-fly-into-south-park-episode/ Common Law Causby vs United States:
 http://www.thehappychickencoop.com/a-history-of-chickens/ Drones and PbD:
 http://www.dezeen.com/2014/10/30/ambulance-drone-alec-momont-emergency-uav-tu-delft/ Internet of Things:
 http://www.computerweekly.com/news/4500260406/Top-10-internet-of-things-stories-of-2015 Risk is dynamic, it will be greatest for the first generation of IoT devices: 
 http://blog.orbitahealth.com/bebaio/8-iot-cartoons-that-will-add-some-humor-to-your-day