Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
The future is here and that future is populated with billions of devices sensing and communicating everything from weather conditions and your vital signs to how many eggs are in your refrigerator. Technology research firms such as Gartner predict that, in five to 10 years, the number of smart devices will balloon to more than 26 billion. Welcome to the “Internet of Things” (IoT) ' the Web of embedded computing devices that interact with our everyday lives. Like any technology revolution, those devices have no interest in waiting for the legal world to catch up, including that smart fruit bowl monitoring the ripeness of your bananas. As a result, if a General Counsel's wearable device measuring nighttime biorhythms does not keep her awake at night, the prospect of billions of devices sensing everything about her customers and employees during an era of cyber insecurity probably will.
Challenges
Privacy
The Internet of Things presents numerous challenges for technology attorneys. As the litany of recent data breaches has made clear, organizations are already struggling to protect personal data against relentless hacker attacks. The IoT will exponentially increase the amount of data that enterprises will need to secure. Further, these IoT devices, more often than not, are “in the wild.” This means that, although these devices are collecting data outside the confines of an organization's secure environment, they nonetheless communicate information back to the organization. Further, because a particular employee or customer may interact with hundreds of devices every day, many devices outside the control of the organization may leak pertinent information about that person.
Liability
Privacy concerns are not the only worries that counsel will need to be concerned with. The Internet of Things may introduce entirely new and complex areas of potential liability. For example, as IoT devices become more autonomous, who is liable when things go wrong? While the failure of a smart fruit bowl is likely of little consequence, failures of self-driving cars and medical devices may be catastrophic, for obvious reasons. Significant gaps in laws and judicial guidance will ultimately create uncertainty within the offices of counsel for the foreseeable future.
The FTC
Finally, counsel may lose sleep over the fact that the Federal Trade Commission (FTC) has thrown itself into the fray. Specifically, the FTC has recently asserted broad authority to protect consumers from businesses' collection of data. The centerpiece of this assertion of authority is the Federal Trade Commission Act (FTC Act) that prohibits “unfair or deceptive acts or practices in or affecting commerce,” and empowers the FTC to enforce the FTC Act. 15 U.S.C. '45(a). The FTC Act defines “unfair acts or practices” as acts or practices that cause or are likely to cause “substantial injury to consumers which [are] not reasonably avoidable by consumers themselves and not outweighed by countervailing benefits to consumers or to competition.” 15 U.S.C. '45(n). The FTC is empowered to enforce this prohibition using administrative remedies (in a trial-type proceeding before an administrative law judge) and/or judicial remedies (in a federal court by seeking civil penalties and/or injunctive relief). 15 U.S.C. ”45(b) and 53(b).
In the context of the Internet of Things, the FTC has begun to make the regulation of IoT an administrative priority. That scrutiny manifested itself in a recent enforcement action (and settlement) involving TRENDNet: a manufacturer of routers, Internet cameras, and other networking devices. The FTC took issue with TRENDNet's failure to adequately secure its Internet camera devices, potentially exposing users' live video streams to the public. The FTC action against TRENDNet not only produced significant bad press for the company, it also resulted in restrictions to TRENDNet's marketing, mandatory customer support obligations, retooling of its security policies, and mandatory third-party reviews of its security operations for the next 20 years. Once the FTC has a company in its crosshairs, that company may be forced to expend significant resources in the form of compliance costs and legal fees. For example, the company may be asked to overhaul its data security policies and practices, notify affected customers, hire third-party auditors, and/or subject itself to continual FTC oversight for many years. Although the FTC's asserted broad authority has been challenged in a pending interlocutory appeal to the Third Circuit (see, FTC v. Wyndham Worldwide Corp., 2:13-cv-01887-ES-JAD), organizations should assume that the FTC will continue to assert its authority at least in the near-term.
What to Do
How should organizations react to such risks? First, launch an internal education campaign for your engineering staff to communicate the importance of designing secure technologies. Often, engineering teams are more focused on staying ahead of the technology curve and do not adequately appreciate the potential legal risks of launching insecure products ' especially in a legal environment with increased scrutiny on cybersecurity and privacy issues. Such efforts can place the organization in a good position to balance speed-to-market with minimizing legal exposure for the organization.
Second, even though many IoT devices use cutting-edge technology, your organization should strive for commonly used and readily available data security measures. Part of this effort should involve reviewing the organizations' existing security policies to ensure they adequately address the unique characteristics of IoT. Should litigation ensue, this effort will help the organization establish that it deployed a reasonable level of care in collecting and protecting data. This becomes especially important when an organization operates in heavily regulated industries such as health care, education, and finance, where expectations of privacy protections are heightened.
Third, develop a privacy policy and stick to it. As straightforward as this may sound, it cannot be overemphasized. Indeed, the primary vehicle the FTC leverages to initiate complaints is an organization's failure to adopt a privacy policy or, more importantly, the organization's failure to follow its own public privacy policies. The FTC views the latter as an unfair and deceptive act justifying it initiating an action.
Finally, scrutinize data management practices by your organization. As storage becomes less expensive and the promises of “big data” analytics grow, your organization may be tempted to keep everything collected by IoT devices. This can significantly increase organizational risk ' more data is susceptible to breach and e-discovery costs can skyrocket if litigation occurs. Counsel should sit down with the rest of the organization and determine what data collection is necessary for the organization's business. If the organization must keep certain data, consider disassociating that data from specific users. This will help alleviate the potential liability should the data be leaked in a cyber-attack. Once the organization decides what data should be saved, counsel can work with the rest of the organization to develop clear and consistent data retention policies to manage that data.
Conclusion
The Internet of Things offers an exciting opportunity as industries develop innovative ways to collect and analyze environmental data. However, fast-moving technological developments often present new and substantial legal and organizational risk. IoT will likely be no different. Proactively addressing these issues will help counsel effectively conduct its own collection and analysis of at-risk data and quickly respond when problems arise.
Andrea L. Gothing , Seth A. Northrop and Li Zhu are attorneys at Robins, Kaplan, Miller & Ciresi L.L.P. Their practice focuses on technology litigation and advice related to intellectual property, cybersecurity and privacy.
The future is here and that future is populated with billions of devices sensing and communicating everything from weather conditions and your vital signs to how many eggs are in your refrigerator. Technology research firms such as
Challenges
Privacy
The Internet of Things presents numerous challenges for technology attorneys. As the litany of recent data breaches has made clear, organizations are already struggling to protect personal data against relentless hacker attacks. The IoT will exponentially increase the amount of data that enterprises will need to secure. Further, these IoT devices, more often than not, are “in the wild.” This means that, although these devices are collecting data outside the confines of an organization's secure environment, they nonetheless communicate information back to the organization. Further, because a particular employee or customer may interact with hundreds of devices every day, many devices outside the control of the organization may leak pertinent information about that person.
Liability
Privacy concerns are not the only worries that counsel will need to be concerned with. The Internet of Things may introduce entirely new and complex areas of potential liability. For example, as IoT devices become more autonomous, who is liable when things go wrong? While the failure of a smart fruit bowl is likely of little consequence, failures of self-driving cars and medical devices may be catastrophic, for obvious reasons. Significant gaps in laws and judicial guidance will ultimately create uncertainty within the offices of counsel for the foreseeable future.
The FTC
Finally, counsel may lose sleep over the fact that the Federal Trade Commission (FTC) has thrown itself into the fray. Specifically, the FTC has recently asserted broad authority to protect consumers from businesses' collection of data. The centerpiece of this assertion of authority is the Federal Trade Commission Act (FTC Act) that prohibits “unfair or deceptive acts or practices in or affecting commerce,” and empowers the FTC to enforce the FTC Act.
In the context of the Internet of Things, the FTC has begun to make the regulation of IoT an administrative priority. That scrutiny manifested itself in a recent enforcement action (and settlement) involving TRENDNet: a manufacturer of routers, Internet cameras, and other networking devices. The FTC took issue with TRENDNet's failure to adequately secure its Internet camera devices, potentially exposing users' live video streams to the public. The FTC action against TRENDNet not only produced significant bad press for the company, it also resulted in restrictions to TRENDNet's marketing, mandatory customer support obligations, retooling of its security policies, and mandatory third-party reviews of its security operations for the next 20 years. Once the FTC has a company in its crosshairs, that company may be forced to expend significant resources in the form of compliance costs and legal fees. For example, the company may be asked to overhaul its data security policies and practices, notify affected customers, hire third-party auditors, and/or subject itself to continual FTC oversight for many years. Although the FTC's asserted broad authority has been challenged in a pending interlocutory appeal to the Third Circuit (see, FTC v.
What to Do
How should organizations react to such risks? First, launch an internal education campaign for your engineering staff to communicate the importance of designing secure technologies. Often, engineering teams are more focused on staying ahead of the technology curve and do not adequately appreciate the potential legal risks of launching insecure products ' especially in a legal environment with increased scrutiny on cybersecurity and privacy issues. Such efforts can place the organization in a good position to balance speed-to-market with minimizing legal exposure for the organization.
Second, even though many IoT devices use cutting-edge technology, your organization should strive for commonly used and readily available data security measures. Part of this effort should involve reviewing the organizations' existing security policies to ensure they adequately address the unique characteristics of IoT. Should litigation ensue, this effort will help the organization establish that it deployed a reasonable level of care in collecting and protecting data. This becomes especially important when an organization operates in heavily regulated industries such as health care, education, and finance, where expectations of privacy protections are heightened.
Third, develop a privacy policy and stick to it. As straightforward as this may sound, it cannot be overemphasized. Indeed, the primary vehicle the FTC leverages to initiate complaints is an organization's failure to adopt a privacy policy or, more importantly, the organization's failure to follow its own public privacy policies. The FTC views the latter as an unfair and deceptive act justifying it initiating an action.
Finally, scrutinize data management practices by your organization. As storage becomes less expensive and the promises of “big data” analytics grow, your organization may be tempted to keep everything collected by IoT devices. This can significantly increase organizational risk ' more data is susceptible to breach and e-discovery costs can skyrocket if litigation occurs. Counsel should sit down with the rest of the organization and determine what data collection is necessary for the organization's business. If the organization must keep certain data, consider disassociating that data from specific users. This will help alleviate the potential liability should the data be leaked in a cyber-attack. Once the organization decides what data should be saved, counsel can work with the rest of the organization to develop clear and consistent data retention policies to manage that data.
Conclusion
The Internet of Things offers an exciting opportunity as industries develop innovative ways to collect and analyze environmental data. However, fast-moving technological developments often present new and substantial legal and organizational risk. IoT will likely be no different. Proactively addressing these issues will help counsel effectively conduct its own collection and analysis of at-risk data and quickly respond when problems arise.
Andrea L. Gothing , Seth A. Northrop and Li Zhu are attorneys at
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.
The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.
Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.