Study on the Infringement of Personal data in the age of Internet of Things and the legal responsibility of IoT service provider

2017 ◽  
Vol 10 (4) ◽  
pp. 277-332
Author(s):  
Hyejin Kim ◽  
◽  
Kyoungjin Choi
IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 4141-4157
Author(s):  
Debajyoti Pal ◽  
Suree Funilkul ◽  
Xiangmin Zhang

2019 ◽  
Vol 62 (6) ◽  
pp. 32-34 ◽  
Author(s):  
Thomas Pasquier ◽  
David Eyers ◽  
Jean Bacon

2014 ◽  
Vol 2014 ◽  
pp. 1-9 ◽  
Author(s):  
Kok-Seng Wong ◽  
Myung Ho Kim

The Internet of Things (IoT) is now an emerging global Internet-based information architecture used to facilitate the exchange of goods and services. IoT-related applications are aiming to bring technology to people anytime and anywhere, with any device. However, the use of IoT raises a privacy concern because data will be collected automatically from the network devices and objects which are embedded with IoT technologies. In the current applications, data collector is a dominant player who enforces the secure protocol that cannot be verified by the data owners. In view of this, some of the respondents might refuse to contribute their personal data or submit inaccurate data. In this paper, we study a self-awareness data collection protocol to raise the confidence of the respondents when submitting their personal data to the data collector. Our self-awareness protocol requires each respondent to help others in preserving his privacy. The communication (respondents and data collector) and collaboration (among respondents) in our solution will be performed automatically.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


Author(s):  
M. Agus Syamsul Arifin ◽  
Robi Pebriansyah ◽  
Budi Santoso

Abstract—Water is an important element that becomes the need of every human being, in the service provider company Clean water control of water usage is still a problem because there is no system that provides information on the use of water on the customer side, especially in the BLUD UPT SPAM Musi Rawas. Customers also find it difficult to see the amount of bills in realtime so that if the billing information has been presented then the customer can adjust the use of the water. This system will use a Waterflow Sensor to read the water flow which will then be converted to Digital data in the form of computer bits that will be processed by Arduino and then sent to the Server to be seen by the Clean Water Service Provider in this case the BLUD UPT SPAM Musi Rawas and customers. Intisari—Air merupakan unsur penting yang menjadi kebutuhan setiap manusia, pada perusahaan penyedia layanan Air bersih kontrol penggunaan air masih menjadi masalah karena belum ada sistem yang menyediakan informasi penggunaan Air pada sisi Pelanggan khususnya di BLUD UPT SPAM Kabupaten Musi Rawas. Pelanggan juga kesulitan untuk melihat jumlah tagihan secara realtime sehingga jika informasi tagihan tersebut sudah tersaji maka pelanggan dapat mengatur penggunaan Airnya. Sistem ini akan menggunakan Waterflow Sensor untuk membaca aliran air yang kemudian akan di konversikan ke data Digital  berupa bit komputer yang akan di proses oleh Arduino kemudian di kirimkan ke Server untuk dapat di lihat oleh Penyedia Jasa Air bersih dalam Hal ini BLUD UPT SPAM Kabupaten Musi Rawas dan Pelanggan.


2019 ◽  
Author(s):  
Vaclav Janecek

This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around two main approaches shaping all ownership theories: a bottom-up and top-down approach. Via these dual lenses, the article reviews existing debates relating to four elements supporting introduction of ownership of personal data, namely the elements of control, protection, valuation, and allocation of personal data. It then explores the explanatory advantages and disadvantages of the two approaches in relation to each of these elements as well as to ownership of personal data in IoT at large. Lastly, the article outlines a revised approach to ownership of personal data in IoT that may serve as a blueprint for future work in this area and inform regulatory and policy debates.


2021 ◽  
Author(s):  
Mohamad Oubai Al-Rejleh

The Internet of Things (IoT) is a revolutionary concept that emerged in the late 21st century, whereby everyday objects such as household items, cars, and wearables, equipped with sensors and (Radio Frequency Identification) RFID chips, can communicate with the internet and to their physical surroundings. These chips allow the connected items to share information, and allow the user to collect information about his/her “quantified self”, measuring personal data such as habits of usage, lifestyle, and location through internet networks. IoT enabled devices are designed to collect, store, share, and analyze of highly personal data ubiquitously and in real time. However, with this new affordance of connectivity, comes a potential loss of privacy for users, as ever increasing sets of personal data are collected and tracked. As such, there is a pressing need for privacy considerations to be embedded within the early stages of design of connected devices and networks.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


2008 ◽  
pp. 1167-1192
Author(s):  
Carlisle Adams ◽  
Katerine Barbieri

This chapter presents technological measures for privacy enforcement (techniques that can be used to ensure that an organization’s privacy promises will be kept). It gives an introduction to the current state of technological privacy enforcement measures for e-services environments, proposes a comprehensive privacy enforcement architecture, and discusses some remaining issues and challenges related to privacy enforcement solutions. The goal of the proposed architecture, aside from integrating many of the current isolated technologies, is to ensure consistency between advertised privacy promises and actual privacy practices at the e-service provider Web site so that users can have greater confidence that their personal data will be safeguarded.


Sign in / Sign up

Export Citation Format

Share Document