BNMC Blog

By accepting you will be accessing a service provided by a third-party external to https://www.bnmc.net/

Who Should Regulate Wearables?

Who Should Regulate Wearables?

Wearable technology, or “wearables”, have been around for decades, technically first becoming popular with Pulsar’s Calculator Wristwatch in the 1970s. Since then, our wearables have become much more capable, accumulating detailed profiles on us as we use them. This begs the question… who is in charge of regulating them?

Wearable Technology Has Been a Successful Mixed Bag

Crunching the numbers, it is clear that wearables as a whole are a successful and appreciated technology by consumers. The number of connected devices around the world, which had reached the not-inconsequential amount of 526 million in 2016, is anticipated to exceed 1.1 billion in 2022. 167 million units of smartwatches and their wristbands are also projected to be shipped that same year.

Clearly, wearable technology has been a commercial success, so there is no reason to anticipate that manufacturers will slow down on their research and development anytime soon. However, it must also be said that wearables have created a few concerns that hadn’t needed to be addressed in the past - especially when it comes to security.

The Dangers of Data

It has been clearly demonstrated that wearables can also create considerable security concerns - in more ways than one might initially think. One only has to look back to the beginning of last year, when the heat mapping feature of the Strava fitness application revealed the classified locations of military bases, thanks to the activity trackers the soldiers would wear during their workouts. Wearables are also notorious for being updated very infrequently (if ever), which makes them perfect devices to be taken over and used as part of a botnet, or as an easy access point into the rest of an otherwise protected network.

One also has to consider what is being done with the data that these devices collect, and how that data could potentially be used to the possible disadvantage of the consumer.

The Regulations that Have Been Put in Place (and Which Matter)

Naturally, such a potentially explosive technology ought to be subject to some regulations. However, the governing bodies and organizations typically responsible for imposing these regulations may not be in a position to do so.

The FD&C Act

The Federal Food, Drug, and Cosmetic Act likely has no power to regulate wearables, as the Food and Drug Administration doesn’t include wearables in its classifications of medical devices, instead describing them as a “low-risk general wellness product.” Basically, the manufacturer’s intended use of a device is what designates it as a medical device or not, which means that (unless wearable manufacturers make the call) these consumer-focused devices won’t need to meet the FD&C Act’s standards.

HIPAA

The Health Insurance Portability and Accountability Act is intended to secure an individual’s rights to their health information. However, while it does provide some protections, HIPAA’s scope doesn’t really cover wearables, which are considered non-covered entities. Furthermore, wearable manufacturers are probably untouched by the secondary use of health data, which is the use of personal health information beyond the direct delivery of healthcare. Because all data is produced by a consumer, and not by a covered entity, secondary use of health data doesn’t apply.

The FTC Act

This act allows the Federal Trade Commission to go after companies that are carrying out deceptive practices, including a failure to comply with their own privacy policy. As it covers entities both covered and not covered by HIPAA, the FTC Act serves as the primary federal statute that dictates how non-covered entities handle their health information-related security practices. The FTC itself is also capable of bringing legal action against those organizations who play fast and loose with consumers’ information, whether they have violated privacy rights or failed to maintain sufficient security.

Where wearables are concerned, the FTC has already spoken up. In 2017, the FTC reported that very few companies discussed their cross-device tracking practices in their privacy policies. Cross-device tracking allows multiple devices to be associated with a single user by linking that user’s activities across these devices. This example shows how the FTC Act is currently one of the more effective means of keeping wearable companies accountable.

What do you think about wearables? Are they something you see as needing to be regulated? Share your thoughts in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, June 05 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing User Tips Privacy Cloud Email Network Security Microsoft Hosted Solutions Software Hackers Computer Business Malware Efficiency Communication Data Google Small Business Workplace Tips IT Services Mobile Devices IT Support Hardware Tech Term Cloud Computing Managed IT Services Internet Data Recovery Innovation Ransomware Backup Smartphone Outsourced IT Users Windows Smartphones Android Mobile Device Saving Money Upgrade Data Backup Miscellaneous Business Continuity Business Management communications Disaster Recovery VoIP Browser Windows 10 Microsoft Office Facebook Server Phishing Information Office 365 Managed IT Services Network Productivity Cybersecurity Social Media Windows 10 Passwords Internet of Things Data Management Gmail Word Gadgets Vulnerability Remote Monitoring App Infrastructure Encryption Artificial Intelligence Quick Tips Chrome Managed Service Mobile Office Apps Website Virtual Reality Access Control Analytics VPN Applications BYOD Router IT Support Settings Money Managed Service Provider Employer-Employee Relationship Tip of the week Information Technology Company Culture Save Money Remote Workers Networking Unified Threat Management Education Development Office Tips Apple Storage IT Management Data Security Collaboration Firewall Maintenance HIPAA Government Virtual Private Network Big Data BDR Computers Hacker Data storage Display WiFi Avoiding Downtime Employee-Employer Relationship Paperless Office Antivirus YouTube Robot Google Drive Bandwidth Content Filtering Risk Management Automation Going Green End of Support Windows 7 Data loss Telephone Systems Software as a Service desktop Remote Computing Business Technology Printing Server Management Laptop Password SaaS Touchscreen The Internet of Things Wi-Fi IT Managed IT Holiday Mobile Security Virtualization Social Network Tablet Document Management Downtime iOS Marketing Solid State Drive Retail Alert Wireless Spam Computing Business Intelligence Outlook Conferencing Two-factor Authentication Training Bring Your Own Device Operating System Social Managed Services Hard Disk Drive LiFi Managed IT Service Vendor Management Customer Relationship Management Scam Hosted Solution Monitors Humor Administration Chromebook Best Practice MSP Augmented Reality Mouse OneNote Break Fix Data Breach Search Managing Stress Co-Managed IT Peripheral Emergency IT solutions Star Wars Servers Google Calendar Running Cable Chatbots eWaste Google Docs Buisness Nanotechnology Hacks Managed Services Provider Network Management Wearable Technology Network upgrade Safety Onboarding GDPR Shadow IT Dark Web Bitcoin Cables Print Toner Myths Alerts Virtual Desktop USB Google Wallet Slack Hard Disk Drives Memes Cyber Monday Digital Payment Sports Motherboard Content Huawei Disaster Fraud Cost Management Network Congestion Messaging Legislation Digital Identity Business Growth Continuity Microsoft Excel Screen Reader Charging Entertainment Vendor SharePoint Smart Office Legal Digital Signage Data Warehouse Gamification Windows 8 Wires Shortcuts Mobile Management Techology Licensing Unified Communications Dongle Drones Writing Monitoring Solid State Drives Smart Technology Streaming Processor How To Lenovo Uninterrupted Power Supply Assessment Employee-Employer Relationships Statistics Spyware Solar Mail Merge Blockchain File Sharing Smart Tech Mobile Device Management Dark Data Update Hybrid Cloud Downloads Computer Care IBM Cybercrime Deep Learning Work Troubleshooting Business Analysis COVID-19 Voice over Internet Protocol Security Cameras Profiles VoIP Unified Threat Management Cooperation Service Level Agreement Spying National Security Holidays Shortcut Distributed Denial of Service Politics Human Error Memory Firefox Superfish Hotspot Internet Exlporer Analysis Students Distribution Bluetooth Comparison Identity Theft Compliance Alt Codes Remote Work Address Permissions Connectivity Customer Service Scalability Corporate Profile IT Technicians Optimization Work/Life Balance Virus Modem FinTech Health Private Cloud Utility Computing User Error G Suite Staff Leominster Budget Office Samsung Updates Payment Card Patch Management Automobile Tech Support Device Reducing Cost Dell Language Value Mixed Reality Logistics Specifications Halloween Regulations Typing Threats Cabling IoT Current Events Migration Consulting Heating/Cooling Multi-Factor Security WannaCry Mirgation Recycling LED Cookies Laptops Time Management Printer K-12 Schools Social Engineering PowerPoint Inventory Google Maps Websites Mobility Batteries Computing Infrastructure Professional Services Asset Management Black Friday Scary Stories Social Networking Cryptocurrency Financial Emoji GPS Upgrades Gadget IT Consultant Crowdsourcing Personal Information Botnet Cameras Meetings Cortana Tracking 3D Printing Cleaning Machine Learning CCTV Processors Webcam Unsupported Software Regulation Computer Repair Relocation Error Mobile Data Point of Sale Ben McDonald shares Travel Mobile Computing Recovery How To Printers Black Market Supercomputer CrashOverride Motion Sickness Staffing Law Enforcement Electronic Medical Records Taxes Notifications Administrator Physical Security Web Server what was your? Twitter IT Budget

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3