SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
Important & Realistic Legal
Perspectives beyond the hype
Simon Aderinlola
NCC-NJI Workshop June 2015, Abuja, Nigeria
A Hot topic worldwide
There’s already a plethora of conferences, projections,
webinars, discussion sessions & consultants around the
‘Internet of Things’
A Hot topic worldwide
There’s already a plethora of
conferences, projections, webinars,
discussion sessions & consultants
around the ‘Internet of Things’
Intros: what this is not about
This presentation won’t try to impress you with the extent of
the tech around The Internet of Things.
A few slides will indicate where IoT is in 2015, but it won’t dwell
on just that.
The aim is also not to belly-ache about what Nigeria is not
doing at present, but to:
1. build a possibility picture and
2. make useful recommendations to shape policy
What is the Internet of things?
First, what is the Internet?
a global system of interconnected computer networks linking
billions of devices worldwide, using standardized communication
protocols to provide a variety of information and communication
facilities.
Next, what is the Internet OF THINGS?
Short-definition: The ability for everyday devices to connect with each
other and with people
Long-definition: The Internet of Things, also called The Internet of
Objects, refers to a wireless network between objects, usually a
network that’s both wireless & self-configuring, such as household
appliances....Wikipedia
What is the Internet of things?
How does it come about?
By embedding short-range mobile transceivers into a wide array of
additional gadgets & everyday items, enabling new communication
forms between people and things, and between things themselves,
we enable, not just for the wow factor, but for true convenience.
Reality check
• Today, there are 6 billion internet-connected devices
• By 2020, estimates put that number as high as 50 billion: 4-7
connected devices per person
• At present, most smart products are fragmented and do not work
together. As data are siloed in each product’s separate app.
• That will change in the future as devices grow more inter-
connected
GE Jet engine sensors
Connected
stadia
• Enhanced stadium
experience for
fans
• Live Augmented
reality: who’s that
boy?
• Player information,
news, injury
status, former
club etc.
Sounds nice, so what’s the problem?
The Johnny Depp access rights problem in ‘Transcendence’
With unlimited access to data, he could tell by Oxytocin, Dopamine
and other hormone levels that his wife was lying. With unlimited
access to data, he could see through her skin and though he was her
husband, her comment “that’s not right” underscores the ethical
nature of the challenge.
Identity theft and being locked out
Valid concerns if you have ever experienced your signature being
forged, your ATM PIN being used or your email account hacked!
Over-empowering governments
Most respondents off a survey do not believe the internet is safe,
not even if in the hands of their country’s government = top men
The malfunction concern
Security and mitigation systems lag behind front-end innovation
Learnings from the EU
The Data Protection Directive 95/46/EC:
• This is the reference text, at EU level, on the protection of
personal data, inspired by Council of Europe Convention 108/81
• It sets up a regulatory framework which seeks to strike a balance
between a high level of protection of individuals and the free
movement of personal data within the European Union
• It provides a high level of protection of personal data, regardless
of technologies used & sets limits on its collection and use
• It demands that each Member State set up an independent
national body responsible for the protection of these fundamental
concerns & it applies to both the public & private sectors.
Learnings from the EU
The roadmap for the review
– Public consultation (May-Dec 2009)
– Written input received: 150-200
– Commission reflection (Jan-Sept 2010)
– Stakeholder meetings, impact analysis
– Communication (November 2010)
– Consultation & additional feedback
– Commission proposal
– Co-decision of EP + Council
– Implementation, where necessary
Learnings from the US
• In a February 2014 speech, Commissioner Brill expressed
concern that data from devices—that consumers might not
even know are actually connected to the Internet—can be
combined with existing troves of data to make it even
easier to make sensitive predictions about consumers, such
as those involving their sexual orientation, health
conditions, religion and race
Learnings from the US
Learnings from China
China’s 5-year plan
• Understand the importance of the IoT
• Correctly get the general idea of the IoT
• Assign the local development task of the IoT
• Guide the development of the key projects of IoT
• Create favorable environment for the development of the IoT
• Create 10 clusters and more than 1,000 IoT firms
• Build a $100 Billion industry by 2020
Expected industry moves in 2015
• More ‘productized’ offerings. There will be many more platforms
and solutions enabling out-of-the-box connected devices
• Breakthroughs in smart city service deployments. 2015 will be
the year when we’ll see some real commercial success stories in
smart cities, especially from services that save money e.g. in
Street lighting
• Major OS and new startups will disrupt the connected car market
• Mobile gets a say: i-beacons and wearables to drive more
“connected-ness”
• Avatar concepts start getting real beyond ‘Second Life’ and
related games, e.g. a company called ‘Evrythng’
• Privacy and security. Issues of privacy and security will reach the
top of the agenda. The complexity of IoT solutions will require a
fresh, yet collaborative way of thinking about security.
Source: Machina research
What does an IoT enabled house feel like?
Summary of valid concerns
• Threats to the Individual & to physical safety: planes, trains and
automobiles (Personal Injury/Property Damage)
• The changing face of identity theft: extends to the “things” that track
our behavior that can then be mal-used to threaten us personally.
• Infringement of IP, copyright, DRM and rights recognition & protection
• Physical & data insecurity
• Impacting of legal Compliance programs: consent to use data, privacy
policies, data breach notification, etc.
• Obscuring of Security Procedures via unauthorized remote
”experiments”
• Contractual Indemnity: the argument of ‘it’s a thing, not a person’
• Insurance fraud and self-inflicted damage
• Country distrust e.g. USA - France communication based on Wikileaks’
claims
We say NO to that ☺ ...it’s inevitable and already here. An easy 1st
step is that legislation mandates manufacturers of smart devices to:
• build security into devices from the outset, rather than as a
design afterthought
• train employees on the critical nature of security and when
outside service providers are engaged, those providers are
capable of maintaining reasonable security measures and
providing appropriate oversight
• when a security risk is identified, using a "defense-in-depth"
strategy whereby multiple layers of security may be used to
defend against the identified risk
• ignite measures to keep unauthorized users from attempting or
accessing a consumer's device, data, or personal information and
• monitoring connected devices throughout their expected life
cycle and providing security patches to cover known risks
So…do we say NO to IoT?
• Make a conscious effort to make proposals for regulation succinct,
discernible and follow/obey-able
• Avoid cut-and-paste regulation (Covey’s law: Seek first to understand…)
• Always be clear on whose side you are when launching new tech:
fairness, ethics, humanity, profits, did-it-first etc.
• Balance need for openness with the principle of a need-to-know
And finally, a word for the tech-savvy
…and our learned legal practitioners
• Expand your knowledge frontiers, ask more questions, demand
rendition in plain English (e.g. PIN use, identity theft, Social media use)
• Good news: there are sites designed to render complexities simply
• While not becoming complacent & abdicating this responsibility,
never forget this is a “difficult conversation” that must be had
“Seek first to understand, then be understood”
THANK YOU
Picture & data credits
• www.eecatalogue.com [smart-home setup]
• European Commission DG Justice
• Corporate immersion institute: China & the IoT
• https://www.oasis-open.org/committees/ubl
• http://www.w3.org/html/.
• www.fool.com
• https://www.oasis-open.org/committees/tc_cat.php?cat=cloud
• www.holistichosting.com
• www.ge.com
• Machinetomachine magazine
• www.comsoc.org/blog

Más contenido relacionado

La actualidad más candente

“Permissionless Innovation” & the Clash of Visions over Emerging Technologies
“Permissionless Innovation” & the Clash of Visions over Emerging Technologies“Permissionless Innovation” & the Clash of Visions over Emerging Technologies
“Permissionless Innovation” & the Clash of Visions over Emerging TechnologiesAdam Thierer
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design360mnbsu
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceTushar Rajput
 
Digital Citizenship by Fatema Salik
Digital Citizenship by Fatema SalikDigital Citizenship by Fatema Salik
Digital Citizenship by Fatema Salikguest8541ec
 
Internet of Things for Libraries
Internet of Things for LibrariesInternet of Things for Libraries
Internet of Things for LibrariesNicole Baratta
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 
Digital Citizenship by Fatema
Digital Citizenship by FatemaDigital Citizenship by Fatema
Digital Citizenship by Fatemaguest8541ec
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpointJannahAboulhassan
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersNicole Black
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipr_bushlow
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
The Evolution of Internet of Things
The Evolution of Internet of ThingsThe Evolution of Internet of Things
The Evolution of Internet of ThingsCasaleggio Associati
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019John D. Johnson
 
A brief history of how internet of things become a thing - onmywaytoiot
A brief history of how internet of things become a thing - onmywaytoiotA brief history of how internet of things become a thing - onmywaytoiot
A brief history of how internet of things become a thing - onmywaytoiotOn my way to IoT
 

La actualidad más candente (18)

Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
“Permissionless Innovation” & the Clash of Visions over Emerging Technologies
“Permissionless Innovation” & the Clash of Visions over Emerging Technologies“Permissionless Innovation” & the Clash of Visions over Emerging Technologies
“Permissionless Innovation” & the Clash of Visions over Emerging Technologies
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
Digital Citizenship by Fatema Salik
Digital Citizenship by Fatema SalikDigital Citizenship by Fatema Salik
Digital Citizenship by Fatema Salik
 
Internet of Things for Libraries
Internet of Things for LibrariesInternet of Things for Libraries
Internet of Things for Libraries
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
Digital Citizenship by Fatema
Digital Citizenship by FatemaDigital Citizenship by Fatema
Digital Citizenship by Fatema
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Chapter 6_dp-pertemuan_9
 Chapter 6_dp-pertemuan_9 Chapter 6_dp-pertemuan_9
Chapter 6_dp-pertemuan_9
 
Chapter 3_dp-pertemuan 4&5
 Chapter 3_dp-pertemuan 4&5 Chapter 3_dp-pertemuan 4&5
Chapter 3_dp-pertemuan 4&5
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
The Evolution of Internet of Things
The Evolution of Internet of ThingsThe Evolution of Internet of Things
The Evolution of Internet of Things
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
A brief history of how internet of things become a thing - onmywaytoiot
A brief history of how internet of things become a thing - onmywaytoiotA brief history of how internet of things become a thing - onmywaytoiot
A brief history of how internet of things become a thing - onmywaytoiot
 

Similar a The internet of things..perspectives for the Nigerian legal system

IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureFacundo Mauricio
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...Patrick McCormick
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)Adam Thierer
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268xosap
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In IndiaIRJET Journal
 
The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115Devaraj Sl
 
Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docxBestMan28
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.vitor94
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 

Similar a The internet of things..perspectives for the Nigerian legal system (20)

Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the future
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docx
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 

Más de Simon Aderinlola

Digital music exploitation in Nigeria - Digital Licensing Committee recommend...
Digital music exploitation in Nigeria - Digital Licensing Committee recommend...Digital music exploitation in Nigeria - Digital Licensing Committee recommend...
Digital music exploitation in Nigeria - Digital Licensing Committee recommend...Simon Aderinlola
 
Policy makers as marketers of the industry - key considerations for desired i...
Policy makers as marketers of the industry - key considerations for desired i...Policy makers as marketers of the industry - key considerations for desired i...
Policy makers as marketers of the industry - key considerations for desired i...Simon Aderinlola
 
Reducing the hit &-miss in scaling up an agent network
Reducing the hit &-miss in scaling up an agent networkReducing the hit &-miss in scaling up an agent network
Reducing the hit &-miss in scaling up an agent networkSimon Aderinlola
 
What does a Nigerian VAS customer really want?
What does a Nigerian VAS customer really want?What does a Nigerian VAS customer really want?
What does a Nigerian VAS customer really want?Simon Aderinlola
 
Avoiding agent churn in fledgling markets: keeping agents busy from day 1
Avoiding agent churn in fledgling markets: keeping agents busy from day 1Avoiding agent churn in fledgling markets: keeping agents busy from day 1
Avoiding agent churn in fledgling markets: keeping agents busy from day 1Simon Aderinlola
 
Bridging the regulator regulated divide - the minefield and goldmine
Bridging the regulator regulated divide - the minefield and goldmineBridging the regulator regulated divide - the minefield and goldmine
Bridging the regulator regulated divide - the minefield and goldmineSimon Aderinlola
 
VAS as catalyst for MobileMoney uptake: a Nigerian case
VAS as catalyst for MobileMoney uptake: a Nigerian caseVAS as catalyst for MobileMoney uptake: a Nigerian case
VAS as catalyst for MobileMoney uptake: a Nigerian caseSimon Aderinlola
 

Más de Simon Aderinlola (8)

Digital music exploitation in Nigeria - Digital Licensing Committee recommend...
Digital music exploitation in Nigeria - Digital Licensing Committee recommend...Digital music exploitation in Nigeria - Digital Licensing Committee recommend...
Digital music exploitation in Nigeria - Digital Licensing Committee recommend...
 
Policy makers as marketers of the industry - key considerations for desired i...
Policy makers as marketers of the industry - key considerations for desired i...Policy makers as marketers of the industry - key considerations for desired i...
Policy makers as marketers of the industry - key considerations for desired i...
 
Reducing the hit &-miss in scaling up an agent network
Reducing the hit &-miss in scaling up an agent networkReducing the hit &-miss in scaling up an agent network
Reducing the hit &-miss in scaling up an agent network
 
What does a Nigerian VAS customer really want?
What does a Nigerian VAS customer really want?What does a Nigerian VAS customer really want?
What does a Nigerian VAS customer really want?
 
I sat with an agent
I sat with an agentI sat with an agent
I sat with an agent
 
Avoiding agent churn in fledgling markets: keeping agents busy from day 1
Avoiding agent churn in fledgling markets: keeping agents busy from day 1Avoiding agent churn in fledgling markets: keeping agents busy from day 1
Avoiding agent churn in fledgling markets: keeping agents busy from day 1
 
Bridging the regulator regulated divide - the minefield and goldmine
Bridging the regulator regulated divide - the minefield and goldmineBridging the regulator regulated divide - the minefield and goldmine
Bridging the regulator regulated divide - the minefield and goldmine
 
VAS as catalyst for MobileMoney uptake: a Nigerian case
VAS as catalyst for MobileMoney uptake: a Nigerian caseVAS as catalyst for MobileMoney uptake: a Nigerian case
VAS as catalyst for MobileMoney uptake: a Nigerian case
 

Último

FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRnishacall1
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 

Último (7)

FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 

The internet of things..perspectives for the Nigerian legal system

  • 1. Important & Realistic Legal Perspectives beyond the hype Simon Aderinlola NCC-NJI Workshop June 2015, Abuja, Nigeria
  • 2. A Hot topic worldwide There’s already a plethora of conferences, projections, webinars, discussion sessions & consultants around the ‘Internet of Things’
  • 3. A Hot topic worldwide There’s already a plethora of conferences, projections, webinars, discussion sessions & consultants around the ‘Internet of Things’
  • 4. Intros: what this is not about This presentation won’t try to impress you with the extent of the tech around The Internet of Things. A few slides will indicate where IoT is in 2015, but it won’t dwell on just that. The aim is also not to belly-ache about what Nigeria is not doing at present, but to: 1. build a possibility picture and 2. make useful recommendations to shape policy
  • 5.
  • 6. What is the Internet of things? First, what is the Internet? a global system of interconnected computer networks linking billions of devices worldwide, using standardized communication protocols to provide a variety of information and communication facilities. Next, what is the Internet OF THINGS? Short-definition: The ability for everyday devices to connect with each other and with people Long-definition: The Internet of Things, also called The Internet of Objects, refers to a wireless network between objects, usually a network that’s both wireless & self-configuring, such as household appliances....Wikipedia
  • 7. What is the Internet of things? How does it come about? By embedding short-range mobile transceivers into a wide array of additional gadgets & everyday items, enabling new communication forms between people and things, and between things themselves, we enable, not just for the wow factor, but for true convenience. Reality check • Today, there are 6 billion internet-connected devices • By 2020, estimates put that number as high as 50 billion: 4-7 connected devices per person • At present, most smart products are fragmented and do not work together. As data are siloed in each product’s separate app. • That will change in the future as devices grow more inter- connected
  • 8. GE Jet engine sensors
  • 9. Connected stadia • Enhanced stadium experience for fans • Live Augmented reality: who’s that boy? • Player information, news, injury status, former club etc.
  • 10. Sounds nice, so what’s the problem? The Johnny Depp access rights problem in ‘Transcendence’ With unlimited access to data, he could tell by Oxytocin, Dopamine and other hormone levels that his wife was lying. With unlimited access to data, he could see through her skin and though he was her husband, her comment “that’s not right” underscores the ethical nature of the challenge. Identity theft and being locked out Valid concerns if you have ever experienced your signature being forged, your ATM PIN being used or your email account hacked! Over-empowering governments Most respondents off a survey do not believe the internet is safe, not even if in the hands of their country’s government = top men The malfunction concern Security and mitigation systems lag behind front-end innovation
  • 11. Learnings from the EU The Data Protection Directive 95/46/EC: • This is the reference text, at EU level, on the protection of personal data, inspired by Council of Europe Convention 108/81 • It sets up a regulatory framework which seeks to strike a balance between a high level of protection of individuals and the free movement of personal data within the European Union • It provides a high level of protection of personal data, regardless of technologies used & sets limits on its collection and use • It demands that each Member State set up an independent national body responsible for the protection of these fundamental concerns & it applies to both the public & private sectors.
  • 12. Learnings from the EU The roadmap for the review – Public consultation (May-Dec 2009) – Written input received: 150-200 – Commission reflection (Jan-Sept 2010) – Stakeholder meetings, impact analysis – Communication (November 2010) – Consultation & additional feedback – Commission proposal – Co-decision of EP + Council – Implementation, where necessary
  • 13. Learnings from the US • In a February 2014 speech, Commissioner Brill expressed concern that data from devices—that consumers might not even know are actually connected to the Internet—can be combined with existing troves of data to make it even easier to make sensitive predictions about consumers, such as those involving their sexual orientation, health conditions, religion and race
  • 15. Learnings from China China’s 5-year plan • Understand the importance of the IoT • Correctly get the general idea of the IoT • Assign the local development task of the IoT • Guide the development of the key projects of IoT • Create favorable environment for the development of the IoT • Create 10 clusters and more than 1,000 IoT firms • Build a $100 Billion industry by 2020
  • 16. Expected industry moves in 2015 • More ‘productized’ offerings. There will be many more platforms and solutions enabling out-of-the-box connected devices • Breakthroughs in smart city service deployments. 2015 will be the year when we’ll see some real commercial success stories in smart cities, especially from services that save money e.g. in Street lighting • Major OS and new startups will disrupt the connected car market • Mobile gets a say: i-beacons and wearables to drive more “connected-ness” • Avatar concepts start getting real beyond ‘Second Life’ and related games, e.g. a company called ‘Evrythng’ • Privacy and security. Issues of privacy and security will reach the top of the agenda. The complexity of IoT solutions will require a fresh, yet collaborative way of thinking about security. Source: Machina research
  • 17. What does an IoT enabled house feel like?
  • 18. Summary of valid concerns • Threats to the Individual & to physical safety: planes, trains and automobiles (Personal Injury/Property Damage) • The changing face of identity theft: extends to the “things” that track our behavior that can then be mal-used to threaten us personally. • Infringement of IP, copyright, DRM and rights recognition & protection • Physical & data insecurity • Impacting of legal Compliance programs: consent to use data, privacy policies, data breach notification, etc. • Obscuring of Security Procedures via unauthorized remote ”experiments” • Contractual Indemnity: the argument of ‘it’s a thing, not a person’ • Insurance fraud and self-inflicted damage • Country distrust e.g. USA - France communication based on Wikileaks’ claims
  • 19. We say NO to that ☺ ...it’s inevitable and already here. An easy 1st step is that legislation mandates manufacturers of smart devices to: • build security into devices from the outset, rather than as a design afterthought • train employees on the critical nature of security and when outside service providers are engaged, those providers are capable of maintaining reasonable security measures and providing appropriate oversight • when a security risk is identified, using a "defense-in-depth" strategy whereby multiple layers of security may be used to defend against the identified risk • ignite measures to keep unauthorized users from attempting or accessing a consumer's device, data, or personal information and • monitoring connected devices throughout their expected life cycle and providing security patches to cover known risks So…do we say NO to IoT?
  • 20. • Make a conscious effort to make proposals for regulation succinct, discernible and follow/obey-able • Avoid cut-and-paste regulation (Covey’s law: Seek first to understand…) • Always be clear on whose side you are when launching new tech: fairness, ethics, humanity, profits, did-it-first etc. • Balance need for openness with the principle of a need-to-know And finally, a word for the tech-savvy …and our learned legal practitioners • Expand your knowledge frontiers, ask more questions, demand rendition in plain English (e.g. PIN use, identity theft, Social media use) • Good news: there are sites designed to render complexities simply • While not becoming complacent & abdicating this responsibility, never forget this is a “difficult conversation” that must be had
  • 21. “Seek first to understand, then be understood” THANK YOU
  • 22. Picture & data credits • www.eecatalogue.com [smart-home setup] • European Commission DG Justice • Corporate immersion institute: China & the IoT • https://www.oasis-open.org/committees/ubl • http://www.w3.org/html/. • www.fool.com • https://www.oasis-open.org/committees/tc_cat.php?cat=cloud • www.holistichosting.com • www.ge.com • Machinetomachine magazine • www.comsoc.org/blog