Abstract
When thinking about privacy management in Internet of Things (IoT) devices, these questions must be considered: What Personal Identifiable Information (PII) is being collected, used, transmitted, and stored? Do the IoT devices collect only the minimum data needed for the intended service(s) they claim to provide? Who has access to the data, and who ultimately owns the data? Are there security requirements that protect and govern the data, and do regulatory mandates ensure the privacy of the data? The security challenges of IoT are as varied as the heterogenous swath of IoT devices; however, the manufacturers and the customers of these IoT devices are the data stewards, and ultimately the keepers of the privacy of the data. Some governments have passed regulations to protect the privacy of its’ citizens’ data, but only a handful of countries have employed that measure as a solution to privacy management.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
European Parliament and Council (2016) General Data Protection Regulation. Official Journal of the European Union, Brussels. https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX%3A32016R0679
Network World (2018) Identifying the Internet of Things – one device at a time. https://www.networkworld.com/article/3287927/internet-of-things/identifying-the-internet-of-things-one-device-at-a-time.html
Oriwoh E, Al-Khateeb H, Conrad M (2015) Responsibility and non-repudiation in resource-constrained Internet of Things scenarios. https://doi.org/10.13140/RG.2.1.4030.3124
NIST (National Institute of Standards and Technology), NIST Big Data Interoperability Framework: Volume 1, Definitions, Special Publication (NIST SP) - 1500-1. https://www.nist.gov/publications/nist-big-data-interoperability-framework-volume-1-definitions
Gellman, “Fair Information Processing Practices,” 2012. https://www.researchgate.net/publication/279297894_Responsibility_and_Non-repudiation_in_resource-constrained_Internet_of_Things_scenarios
NIST (National Institute of Standards and Technology) (2014) Privacy Engineering Objectives and Risk Model. Kantara Initiative IoT workshop
OFCOM (2015) Promoting investment and innovation in the Internet of Things. OFCOM, London
Payton T, Claypoole T (2014) Privacy in the age of big data: recognizing threats, defending your rights, and protecting your family. Rowman & Littlefield Publishers, Lanham. ProQuest Ebook Central, https://www.proquest.com/libraries/academic/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Wilson Caudill, G. (2019). Privacy Management in the Internet of Things (IoT). In: Hudson, F. (eds) Women Securing the Future with TIPPSS for IoT. Women in Engineering and Science. Springer, Cham. https://doi.org/10.1007/978-3-030-15705-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-15705-0_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15704-3
Online ISBN: 978-3-030-15705-0
eBook Packages: EngineeringEngineering (R0)