David Greetham: Dotting I’s and Crossing T’s: Risk Mitigation in the Age of IoT

Extract from David Greetham’s article “Dotting I’s and Crossing T’s: Risk Mitigation in the Age of IoT”

The surging popularity of interconnected IoT (Internet of Things) devices—ranging from smart home gadgets like Alexa and Ring doorbells to large-scale commercial applications such as sensor-equipped trash cans—demonstrates the many potential benefits of smart technologies. However, the ubiquity of IoT devices also poses serious risks, particularly for businesses. Data privacy implications, data risk management, and even the technology itself can confuse corporations and the law firms that advise them. 

To dispel this confusion, let’s take a few minutes to explore a couple of key issues related to IoT. We’ll discover that focusing on the details—dotting I’s and crossing T’s—is the key to managing risk in this realm. 

In any event, one thing is certain: By the end of this article, you’ll know the meaning of the word “zettabyte.” 

IoT Explosion

Let’s begin with the basics. Though IoT devices may seem complicated, they’re simply physical objects with internet capabilities, like smart watches and equipped cars. Each device has a unique internet protocol (IP) address, and the interconnection of these devices creates a vast data network. 

Read more here

ACEDS