Articles Posted in Internet of Things (IoT)

Posted

Reflecting the growing concern with cybersecurity threats associated with Internet of Things (IoT) products, the Federal Communications Commission (FCC) adopted rules at its March 2024 meeting to implement a new Voluntary Cybersecurity Labeling Program. The new label— “U.S. Cyber Trust Mark”—will be affixed on wireless consumer IoT products that go through the voluntary review program to ensure that the products comply with baseline cybersecurity criteria established in the September 2022 NIST Report 8425.

In “FCC Announces Consumer IoT Cybersecurity Labeling Program,” Brian E. FinchGlenn S. Richards and Lee G. Petro take a closer look at the new program.

Posted

Alicia McKnight and Brian Finch urge energy industry players to evaluate cybersecurity risks posed by increasingly interconnected and internet-enabled power grids in an article which was published in the latest edition of Pratt’s Privacy & Cybersecurity Law Report.

Posted

GettyImages-184881962-300x200

In our previous post we discussed the importance of conducting a thorough due diligence and procurement process with smart technology providers. Next up? The contract.

The price of a procured product is always important, but equally important are other contractual terms that reflect the commercial agreement. Ultimately, the contract should answer the fundamental question of “What are you buying?” The product itself is not the only feature being purchased. A customer is also buying certainty, service performance, risk mitigation, flexibility, security, compliance, and other similar “intangible” items of value.

Continue Reading →

Posted

Kitchen with smart home icons overlaid“Hey Siri…” “Alexa…” “Okay Google…” These are just some of the buzzwords and phrases that have entered day-to-day vocabulary as a result of the explosion of smart technology. Internet of Things (IoT) devices are in our cars, in our workplaces and on our bodies. But nowhere is smart technology more prevalent than in our homes. The array of services that are available coupled with the growing number of companies and service providers eager to innovate, should only grow this technology’s market share in the coming years.

Continue Reading →

Posted

iStock-953443738-productivity-tracking-300x150I am not at all embarrassed to admit that I love working in my pajamas. A lot of us are working from home now to help flatten the curve, and while social distancing has created a lot of challenges for most people, one of the perks is the ability to socially distance yourself from your hairbrush and roll into the office in your sweatpants. I don’t think I’m alone on this. According to one survey, 60% of office professionals report a better work-life balance when working from home, and 74% of workers would like to telecommute more often after social distancing restrictions are lifted. Not coincidentally, the widescale adoption of telecommuting has resulted in a corresponding uptick in employee monitoring tools.

Continue Reading →

Posted

iStock-1152878038-5g-blockchain-300x300With great power comes great responsibility. 5G is the next generation of 3GPP technology. Along with having the potential to facilitate the next leap in connectivity, 5G technology supremacy also has the power to define the geopolitics of the next century. As the global battle for 5G dominance plays out, companies are driving hard to secure coveted Standard Essential Patents (SEPs) encompassing 5G technology. The victor will secure substantial revenue and money flow in the form of patent royalties.

Continue Reading →

Posted

NewsofNote-300x250

Apple gets around to AR, the NHL enters esports, the Internet of Things may bring new meaning to “workers unite,” so many medical records, and more …

Continue Reading →

Posted

iStock-872962368-chat-bots-265x300Much like humans, bots come in all shapes and sizes. In social media networks, these bots can like what you post and even increase your followers. Companies use bots for all types of things—from booking a ride to giving makeup tutorials. Some bots can even solve your legal problems. Besides saving time and money, bots have the potential to reduce errors and increase a business’s customer base. But what happens when bots spy on users and share personal information? Or when they make racial slurs and offensive comments?

Continue Reading →

Posted

Cayla-interactive-toys-300x300Pleeeease?!” Buying a quick gift or giving in to your child’s pleas for a new toy is quickly becoming a more serious decision. In the age where toys can happily entertain kids by talking to them, the few precious moments those toys buy parents may not be without risk. It’s possible for anyone within an internet-connected toy’s Bluetooth range to connect to the toy and receive their audio recordings, while being up to 100 feet away. For example, in December 2015, VTech allegedly exposed the personal information of 6.4 million children, which included their names, genders and birthdays. Stealing a child’s personal information is, at the very least, concerning. However internet-connected toys come with an additional danger—localized hacking. Just look at Cayla, an internet-connected fashion doll manufactured and sold by Genesis Toys. My Friend Cayla answers fact-based questions, plays games, reads stories, and even solves math problems. Genesis uses third-party voice-recognition software by U.S.- based company, and the doll requires an iOS/Android application to use the software. The doll’s mobile application researches and supplies Cayla with factual answers to questions, but it also prompts children to set their physical location, parents’ names and school name.

Continue Reading →