Explore chapters and articles related to this topic
Conclusion
Published in James William Martin, Operational Excellence, 2021
Data security is also an operational concern because data gathering and management devices are dispersed through a global supply chain (i.e., the IoT). Most organizations have policies, procedures, and processes designed to ensure secure data creation, review, updating, and deletion, depending on roles and responsibilities, but some are more effective than others, as evidenced by periodic data breaches. The General Data Protection Regulation (GDPR) was created by the European Union (EU) to control the security of personal data. Personal data are defined as information associated with an identified individual, who is called a data subject in the GDPR. The GDPR applies to personal data stored in IT systems located either within the EU or personal data of EU citizens stored and used in non-EU systems. Potential penalties for non-compliance are 2–4% of an organization's annual revenue.
Blockchain as a Lifesaver of IoT
Published in Sudhir Kumar Sharma, Bharat Bhushan, Bhuvan Unhelkar, Security and Trust Issues in Internet of Things, 2020
Sukriti Goyal, Nikhil Sharma, Ila Kaushik, Bharat Bhushan, Abhijeet Kumar
In the technology of blockchain, privacy is the major concept. A consumer knows the importance of securing personal data which is recorded on its servers or network or recorded on its servers or system. Personal data is any kind of information associated with a recognized or recognizable natural person. The authority to monitor the data, apply rules for the data as well as sources made available by the network are introduced by the privacy services to the user. In other terms, monitoring data is allowed for the resource or data owner by privacy services. Basically, this is done by allowing the owner describe its access control list (ACL) itself. In this, the needs of giving data privacy, its significance for the existing applications, the conventional approaches for confidentiality, and the disputes recently faced in ensuring privacy are summarized. Further, how the technology of blockchain can be utilized to give confidentiality is provided, as well as a few current privacy systems based on the blockchain technology is introduced.
A Framework to Reduce IoPTS Security Breaches in the Smart Workplace
Published in Claire A. Simmers, Murugan Anandarajan, The Internet of People, Things and Services, 2018
Erika Pleskunas, Murugan Anandarajan
Personal data should be protected by security safeguards against risks such as loss, unauthorized access, modification or disclosure of data. Security is fraught with issues. One issue, particularly for smaller companies, is the tendency to try to save money by scrimping on security measures and policies. Recent research found that many of the top 30 fitness devices did not have either a privacy policy or accurate policy descriptions for the use of the data which would be collected (Bracy, 2013). A second issue is the concept of “multiple points of vulnerability” in IoPTS. There are many more points of communication encompassing the IoPTS product—embedded software, data inside the device, communication channels, data aggregation platform and data centers for analysis of sensor data—so potential security breaches have more ways to occur. Additionally, the sheer volume of connections inherently creates more opportunities for security breaches. The third issue is that there is currently no general agreement on how to define and implement IoPTS security because these technologies are so new and there is not yet a standard for security. The fourth issue is that devices in the IoPTS are very different from previous technologies, so security must be viewed from new and often completely different perspectives. Lastly, there is no “silver bullet” that can effectively eliminate all threats. By the very nature of IoPTS devices, there will always be the risk of security breaches.
Digital accumulation behaviours and information management in the workplace: exploring the tensions between digital data hoarding, organisational culture and policy
Published in Behaviour & Information Technology, 2023
Kerry McKellar, Elizabeth Sillence, Nick Neave, Pam Briggs
The General Data Protection Regulation (GDPR) was introduced in Europe in 2018 (Information Commissioners Office 2018). This privacy and data protection legislation regulates the storage of personal data. Personal data refers to any information related to a natural person or ‘Data Subject’, which can be used to directly or indirectly identify the person. It can be anything from a name, a photo, an email address, bank details, posts on social networking websites, medical information, or a computer IP address. The Regulation places much stronger controls on the processing of ‘sensitive’ personal data including health information. Personal data and its protection are key features of GDPR. This includes clear legal details regarding its collection, storage, and use limitations. GDPR also requires disclosure of data breaches, for which a high financial penalty may be applied.
From Design Requirements to Effective Privacy Notifications: Empowering Users of Online Services to Make Informed Decisions
Published in International Journal of Human–Computer Interaction, 2021
Patrick Murmann, Farzaneh Karegar
The EU General Data Protection Regulation (European Parliament and the Council of the European Union, 2016) (GDPR) stipulates data subject rights as regards obtaining transparency about how one’s personal data will be and have been processed (Art. 12–14). Moreover, the Regulation stipulates the legal right to access, rectify, erase, object to, or restrict the processing of one’s personal data (Art. 15 et seq.). Likewise, data subjects have the right to withdraw their consent at any time, and to move their data to another service. Despite these legal requirements, few usable tools exist to aid data subjects in making informed decisions about when and how to exercise their rights (Murmann & Fischer-Hübner, 2017).
Responsible innovation at work: gamification, public engagement, and privacy by design
Published in Journal of Responsible Innovation, 2022
Daniele Ruggiu, Vincent Blok, Christopher Coenen, Christos Kalloniatis, Angeliki Kitsiou, Aikaterini-Georgia Mavroeidi, Simone Milani, Andrea Sitzia
Introducing gamification in workplace activities can increase employee engagement and productivity regarding various organisational targets. The protection of personal data is crucial to ensure trust among staff, management and the organisation as a whole. By implementing these scenarios user privacy is protected and GDPR regulation is applied.