transcript   Transcript

Cybersecurity & Privacy: What Are the Risks of IoT Devices and How Privacy Rights Can Be Protected

Recorded on: Jun. 28, 2018
Running Time: 01:01:32

Full Transcript:



If you are a Privileged Member, just log in and start reading now! If you are not a Privileged Member, please click here to learn how unlimited access to PLI programs may be right for you and your firm.

To access the streaming media of this presentation, please purchase the corresponding seminar segment.

Taken from the Web Program Internet of Things 2018: Everything is Connected Recorded June 2018 in San Francisco

Cybersecurity & Privacy: What Are the Risks of IoT Devices and How Privacy Rights Can Be Protected [01:01:32]

Safety monitors track every laborer’s step; drones record views previously unseen; wearable/implantable health monitors transmit vital signs; office security tracks your every move; the home “assistants” record your conversations and your refrigerator is reporting how much ice cream and eggs you’re eating.  And that’s just the start.  Many (some say most) existing devices have no security controls presenting enormous cybersecurity risks.  Learn about privacy right concerns, how privacy rights are being protected, and how to control and manage security concerns on IoT devices.

Jared Ho, Christopher J.P. Mitchell, David M. Stauss

(IAPP Privacy credit for Privacy Professionals)

The purchase price of this Web Program segment includes the following article from the Course Handbook available online:
  • Federal Trade Commission, Bureau of Consumer Protection, Staff Perspective, Connected Cars Workshop (January 2018)
    Kristen Anderson
  • Federal Trade Commission, Staff Report, Internet of Things: Privacy & Security in a Connected World (January 2015)
    Kristen Anderson
  • Federal Trade Commission, Careful Connections: Building Security in the Internet of Things
    Kristen Anderson
  • Federal Trade Commission, Start with Security: A Guide for Business, Lessons Learned from FTC Cases (June 2015)
    Kristen Anderson
  • Examples of Federal Trade Commission Enforcement Actions
    Kristen Anderson
  • Conferences and Workshops from the Federal Trade Commission
    Kristen Anderson
  • Thomas A. Walsh and Eric I. Goodman, Ice Miller LLP, Smart Connections, What Can I Do with All This Data? How to Protect Data for Monetization Strategies
    Kipper V. Tew, Gregory J. Dunn
Presentation Material
  • Cybersecurity & Privacy: What are the Risks of IoT Devices and how Privacy Rights can be Protected
    Jared Ho, Christopher J.P. Mitchell, David M. Stauss
  • (s)
    Jared Ho ~ Senior Attorney, Division of Privacy and Identity Protection, Federal Trade Commission
    Christopher J.P. Mitchell ~ Law Offices of Christopher J.P. Mitchell, PLLC
    David M Stauss ~ Ballard Spahr LLP
    Share
    Email
    Transcript FAQ's
    • How Can I Access Transcripts?
      You must be a Member in good standing.

    • Can I access the Video?
      Yes, you can access the video if you have the Adobe Flash plugin installed. Click on the video camera icon when you mouse over each paragraph. The media will begin playback at that point.

    • Can I get CLE credit for reading the transcript?
      No, CLE credit cannot be earned for reading a transcript. CLE credit is issued only for verified attendance while watching a web program. If seeking credit, please verify the program's eligibility for credit and expiration date in your jurisdiction on the web segment launch page before commencing the program.
    
    • FOLLOW PLI:
    • twitter
    • LinkedIn
    • YouTube
    • RSS

    All Contents Copyright © 1996-2018 Practising Law Institute. Continuing Legal Education since 1933.

    © 2018 PLI PRACTISING LAW INSTITUTE. All rights reserved. The PLI logo is a service mark of PLI.