3 min to read

Data Protection, Privacy and Cybersecurity in the Internet of Things

Date
02 October 2015

DNA fingerprint data on a paper. Macro image.
Privacy Context

‘Pretty soon, even your trousers will have their own Twitter account,’ wrote Paul Ford in Hemispheres magazine. Devices communicating Machine to Machine (M2M) without supervision by the customer, owner, wearer or other individual will collect and transfer large quantities of data superficially about trivial machine events – location, activity, communication or connection, but which often imply information about the lives of identifiable individuals. Other communications might more obviously be about an individual such as health data collected through remote monitoring devices. Bear in mind also that the status of data can change. The number on a chip used to track boxes of medicines in a warehouse is not personal, but it becomes personal data when used by a pharmacy to track medicines dispensed to patients. So all of these data pose privacy and related security risks.

Security Risks

Smart televisions have already been hijacked by botnets. Supposedly secure keyless car tags have been hacked. So an M2M device, for both commercial and privacy reasons, needs to be protected from security threats. Here is a selection:

  1. Can the device be hijacked so that a false identity and false content will be transmitted?
  2. Can the device be deactivated so that nil reports will be falsely made?
  3. Can data transmission be ‘overheard’ so that data are stolen?
  4. In summary can the device be securely authenticated and on the network the classic elements of security (availability, integrity and confidentiality) assured?

Privacy and Data Protection Risks

If data are personal, in the UK the usual 8 Data Protection Principles apply – especially the rules on fair and lawful processing, data quality and security. Similar rules apply throughout the EU and in many other jurisdictions.

First, there must be no invisible collection. So individuals must be told about the activities of M2M devices and in the case of sensitive data such as health information, individual consent will usually be required.

Secondly, devices can carry out invasive monitoring either by design or as an unintended consequence.  Similarly, if the full commercial value of data is to be exploited, it will be analysed extensively. Will profiles of individuals be developed? Do the individuals know what is being done with data from their smart televisions, cars, ovens, refrigerators, gas meters and monitored burglar alarms? One of the lawful bases for this collection and processing must be found in the legislation.

Thirdly, some applications, e.g. Oyster card and vehicle systems – inherently track the movements of individuals. Smart phone apps have been developed for just this purpose. Do individuals know of the tracking? What is its purpose and is it legitimate?

Fourth, some data such as health information require special care. But other data such as food orders might imply religious faith or other sensitive information. Usually specific individual consent is needed to process sensitive data.

Commercial Precautions

First, implement high quality security policies and technology.

Second, be conscious of the privacy risks and give them design priority.

Third, carry out Privacy and Security Impact Assessments before implementing M2M network systems and develop them using Privacy by Design.

Fourth, be aware of the penalties that can be imposed by data protection and privacy regulators.

Authors:

Sven-Erik Heun
Partner, Head of Country
Germany
Tel: +49 (0)69 74222 6000

Ruth Boardman
Partner
UK
Tel: +44 (0)20 7415 6000

Share
Written by
Clarity Admin
Clarity Admin
Related articles
Smart Contracts – Recognising and Addressing the Risks
4 min to read
29 December 2021
Smart Contracts – Recognising and Addressing the Risks
Smart contracts, where some or all of the contractual obligations are defined in and/or performed automatically by a computer program, are expected to have a significant impact on the way business is...
Technology Projects: Managing the Risks of Innovation and Change Part 3: Contract Reset and Dispute Resolution
Technology Projects: Managing the Risks of Innovation and Change Part 3: Contract Reset and Dispute Resolution
Customers in long-term technology projects can find that while they have been working towards their chosen solution a more advanced, cheaper, or simply more desirable technology has become available....
Digital dispute resolution rules to facilitate rapid and cost-effective resolution of disputes involving novel digital technologies
Digital dispute resolution rules to facilitate rapid and cost-effective resolution of disputes involving novel digital technologies
While some saw the development of products using blockchain technology leading to the demise of disputes, the reality is that disputes in the arena of digital technology are increasing in number. Lawtech’s...
Technology Projects: Managing the Risks of Innovation and Change Part 2: During the Life of the Project
Technology Projects: Managing the Risks of Innovation and Change Part 2: During the Life of the Project
Customers in long-term technology projects can find that while they have been working towards their chosen solution a more advanced, cheaper, or simply more desirable technology has become available....
Cookies
We use analytics cookies to help us understand if our website is working well and to learn what content is most useful to visitors. We also use some cookies which are essential to make our website work. You can accept or reject our analytic cookies (including the collection of associated data) and change your mind at any time. Find out more in our Cookie Notice.