Chapter 5 IOT Privacy
Chapter 5 IOT Privacy
Chapter 5 IOT Privacy
(IoT) Privacy
PRIVACY
IOT Privacy
► Privacy in IoT is the right of an individual to have control of when and how their
personal information is collected and processed in the IoT environment
► IoT is the ever growing number of intelligent objects that are being connected to
each other and the internet or similar network.
► These range from simple sensors to smartphones, these appliances communicate
with each other in what seems like an entirely connected world.
► IoT privacy is the special considerations required to protect the information of
individuals from exposure in the IoT environment, in which almost any physical
or logical entity or object can be given a unique identifier and the ability to
communicate autonomously over the Internet or similar network.
IOT Privacy
► 4. Interoperability - The rapid expansion of the IoT in recent years has led to the
development of many different kinds of devices, Application Programming
Interfaces (APIs) infrastructure, data formats, standards and frameworks. An API
is a way for a computer to communicate with another computer, or for a person to
interrogate or instruct a computer and get a result. This has caused significant
interoperability issues, in that devices, software and data from one vendor often
do not work with devices, software and data from other vendors.
► 5. Dependency on vendors - Organisations and individuals who use IoT devices
are often dependant on the vendors or manufacturers of those devices to handle
security and privacy issues through the delivery of software or firmware updates
to fix security vulnerabilities. Sometimes they are reliant upon vendors to ensure
that collected personal information is sufficiently de-identified before it is shared.
IOT Privacy issues
► The data stewards, data architects, data administrators, and data modellers should
review and use the following privacy requirements throughout the system
development life cycle.
Privacy Requirements that can be
considered
► Purpose: Collect and process for purposes that are relevant to the services being
provided. PI must not be collected or used for purposes that are materially
different from the original purpose for which the data was provided.
► Notice: System creators, owners, and fiduciaries must explain to users how their
personal information will be used, collected, protected, retained, kept accurate,
accessed, corrected, or otherwise processed before any processing occurs.
► Choice/Consent: Data subjects must consent to the collection and use of their
personal information.
► Transfer: Data should not be transferred to third parties for their own use without
the data subject’s permission.
Privacy Requirements that can be
considered
► Access, Correction, Deletion: Data subjects must have a means of accessing the
personal information that has been collected about them. They also are entitled to
delete or amend false or inaccurate data.
► Security: Use appropriate technical, logical, and administrative measures to
ensure only authorized access and use of data.
► Minimization: Collect and process the minimum necessary data to achieve the
identified, legitimate intended purposes. The minimization principle is closely
related to the purpose limitation requirement where only the necessary PI is
collected and processed to achieve a legitimate purpose.
Privacy Requirements that can be
considered
► Proportionality: Data collection should be legitimately proportional to need,
purpose, and sensitivity of data. This requirement can be one-step further
abstracted to connect that data to quality and value.
► Retention: Retain data only as long as it is required.
► Act Responsibly: Put a privacy program in place.