Skip to main content

IoT: Privacy, Security, and Your Civil Rights

  • Chapter
  • First Online:
Women Securing the Future with TIPPSS for IoT

Part of the book series: Women in Engineering and Science ((WES))

  • 510 Accesses

Abstract

This chapter delves into the interrelationship between the Internet of Things (IoT) and our civil rights, particularly, the Fourth Amendment to the US Constitution. The goal is to emphasize the immensity of the work to be done to tackle the issues presented with this great ubiquitous asset. We constantly use it, but it can also be the cause of many grave issues detrimental to the safety of our personal data. Also discussed are the fundamentals of privacy, security, and your civil rights and the different obstacles and opportunities that occur along the way, sometimes leading to litigation. We will explain why it is all about the data, who gets hacked and why, and what precautions and actions you can take as an individual and a company.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kranzberg M (1986) Technology and history: “Kranzberg’s Laws”. Technol Cult 27(3):544–560. https://doi.org/10.2307/3105385. Retrieved from http://www.jstor.org/stable/3105385

    Article  Google Scholar 

  2. https://www.economist.com/leaders/2017/05/06/the-worlds-most-valuable-resource-is-no-longer-oil-but-data

  3. https://www.accenture.com/t20160602T030231__w__/us-en/_acnmedia/Accenture/Conversion-Assets/DotCom/Documents/Global/PDF/Dualpub_19/Accenture-Provider-Cyber-Security-The-$300-Billion-Attack.pdf

  4. https://www.fbi.gov/wanted/cyber/iranian-mabna-hackers

  5. https://us.norton.com/internetsecurity-privacy-privacy-vs-security-whats-the-difference.html

  6. https://www.secureworks.com/blog/privacy-vs-security

  7. https://fossbytes.com/right-privacy-fundamental-right-cyber-security-impact-india/. 2017 Aug 29

  8. https://www.huntonprivacyblog.com/2018/07/27/indias-draft-data-privacy-law-issued-today/

  9. Linkedin.com. 2018 June 7

  10. Inside Privacy. 2018 Oct 1

    Google Scholar 

  11. Privacy vs. Security. Do today’s models work with the Internet of Things and its cousin, big data? Thursday, 2017 March 23. By: Brian Dean. https://www.secureworks.com/blog/privacy-vs-security

  12. https://blog.nacdonline.org/posts/the-cyber-blind-spot

  13. WSJ Pro Cybersecurity. 2018 Sept 18

    Google Scholar 

  14. The Denver Post Published, 2016 October 23 at 12:01 am, Updated 2017 March 24 at 12:29 pm

    Google Scholar 

  15. Enterprise.verizon

    Google Scholar 

  16. The book, The Devil Inside the Beltway: The Shocking Expose of the US Government’s Surveillance and Overreach Into Cybersecurity, Medicine and Small Business, by Michael J. Daugherty

    Google Scholar 

  17. https://www.ftc.gov/system/files/documents/cases/labmd_ca11_ftc_opposition_to_fee_request_2018-1119.pdf

  18. LabMD Inc. v. Federal Trade Commission, on Petition for Review of an Order of the Federal Trade Commission (FTC Docket No. 9357)

    Google Scholar 

  19. Business.com/Security/Last modified. 2018 Mar 29

  20. H.R. 5069, 114th Congress (2015–2016) the Cybersecurity Systems and Risks Reporting Act will amend SOX to also apply to cybersecurity systems and cybersecurity systems officers and bring it up to date

    Google Scholar 

  21. https://techspective.net/2018/09/04/what-is-the-us-doing-to-keep-technology-safe/

  22. En.wikipedia.org

  23. United States v. Microsoft Corp., 584 U.S. ___, 138 S.Ct. 1186, 200 L.Ed.2d 610 (April 17, 2018).

    Google Scholar 

  24. Nist.gov

  25. https://www.isao.org/information-sharing-groups/

  26. https://www.nationalisacs.org/about-isac

  27. https://obamawhitehouse.archives.gov/the-press-office/2015/02/13/executive-order-promoting-private-sector-cybersecurity-information-shari

  28. https://www.enisa.europa.eu/publications/information-sharing-and-analysis-center-isacs-cooperative-models

  29. https://eugdpr.org/the-regulation/gdpr-faqs/

  30. CNBC.com. 2018 July 11

  31. Governmenteuropa.eu. 11 Dec 2018

    Google Scholar 

  32. Euractiv.com. 2018 Dec 10 (updated 2018 Dec 18)

  33. H5690 March 2017, Rep. Justin Price, Rhode Island

    Google Scholar 

  34. Lidar is commonly used to make high-resolution maps, with applications in in geodesy, geomatics, archaeology, geography, geology, geomorphology, seismology, forestry, atmospheric physics, laser guidance, airborne laser swath mapping (ALSM), and laser altimetry. The technology is also used in control and navigation for some autonomous cars. Wikipedia

    Google Scholar 

  35. https://www.statista.com/statistics/276703/android-app-releases-worldwide/

  36. Alice Corporation Pty. Ltd., Petitioner v. CLS Bank International et al., 134 S.Ct. 2347 (2014 June)

    Google Scholar 

  37. See United States v. Jones, 132 S.Ct. 945, 565 U.S. 400, 181 L.Ed.2d 911, 80 U.S.L.W. 4125, 23 Fla.L.Weekly Fed. S 102 (2012. Criticized 732 F.3d 187 (3rd Cir. 2013), 12-2548, United States v. Katzin

    Google Scholar 

  38. 565 U.S. 400 (2012), 132 S.Ct. 945, 181 L.Ed.2d 911

    Google Scholar 

  39. Forbes.com. 2014 Nov 16

  40. December 11, 2017, Future of Privacy Forum, fpf.org

  41. Unfairness by algorithm: Distilling the Harms of Automated Decision-Making, Lauren Smith, 2017 December 11, Future of Privacy Forum

    Google Scholar 

  42. https://www.cnet.com/news/equifaxs-hack-one-year-later-a-look-back-at-how-it-happened-and-whats-changed/

  43. https://www.cnbc.com/2017/12/12/starbucks-customer-laptops-hacked-to-mine-cryptocurrency.html

  44. MIT Technology Review, Technologyreview.com, The Download, 2018 Dec 20

  45. MIT Technology Review, Technologyreview.com, Six Cyber Threats to Really About in 2018, by Martin Giles. 2018 Jan 2

  46. Forbes Technology Council, Brian NeSmith, 2018 December 28, Cybersecurity Predictions for 2019. https://www.forbes.com/sites/forbestechcouncil/2018/12/28/cybersecurity-predictions-for-2019/#22a3c8bb4a27

  47. MIT Technology Review, Hijacking Computers to Min Cryptocurrency is all the Rage. https://www.technologyreview.com/s/609031/hijacking-computers-to-mine-cryptocurrency-is-all-the-rage/, Mike Orcutt. 2017 Oct 5

  48. Wired.com, Andy Greenberg Security. 2018 Aug 22

  49. Verizon 2018 Data Breach Investigations Report

    Google Scholar 

  50. https://altaba.gcs-web.com/static-files/346e8981-1015-49dd-b616-66756ba99173

  51. https://www.nytimes.com/2019/01/23/business/dealbook/yahoo-cyber-security-settlement.html

  52. https://www.sec.gov/litigation/admin/2018/33-10485.pdf

  53. Enhancing Cyber-Risk Oversight by Katie Swafford, NACD Directorship May/June 2017

    Google Scholar 

  54. 2016 WL 6081823. decided 2016 Oct 18

    Google Scholar 

  55. https://www.eckertseamans.com/app/uploads/PileggiDelawareWatchJanFeb2017.pdf

  56. Rms.com, RMS Releases Industry’s First Probabilistic Cyber Risk Model, Newark, Calif. 2018 Mar 7

  57. Innovation engineering gets its inspiration from Dr. W. Edwards Deming. For additional information on Dr. Deming’s work go to www.deming.org

  58. Is the Internet of Things Your New Constitution? Philip N. Howard, pnhoward@uw.edu, Professor, Oxford University and University of Washington 9/11/2015. https://www.sas.upenn.edu/andrea-mitchell-center/sites/www.sas.upenn.edu.dcc/files/Howard%20DCC%20Paper%20v3.pdf

  59. Wall Street Journal 2017 October 20

    Google Scholar 

  60. https://www.nytimes.com/2017/07/12/business/apple-china-data-center-cybersecurity.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cynthia D. Mares .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Mares, C.D. (2019). IoT: Privacy, Security, and Your Civil Rights. In: Hudson, F. (eds) Women Securing the Future with TIPPSS for IoT. Women in Engineering and Science. Springer, Cham. https://doi.org/10.1007/978-3-030-15705-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-15705-0_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-15704-3

  • Online ISBN: 978-3-030-15705-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics