In the present Cyber arena, Internet has become an essential service for all of us, as it has given numerous benefits in our day-to-day life and without which we cannot think to live our life. It’s simply amazing how extraordinary the Internet is for us today, as we can switch-on and off the lights from anywhere in the world using our smartphone, wireless printers, switching on the car engine without entering into it, driver-less cars are already available in different parts of the world and it’s all possible through the IoT (Internet of things) which has made dreams come possible.
IoT (Internet of things) is a new revolution, as we can see the future of technologies through it. It is correct that IoT shall be deployed in masses and will attract the applicability in different spheres of our life. Any physical object or an intelligent smart device that can be connected through internet in this digital space, is IoT. In most of the smart cities like Delhi, Vehicles can be tracked and monitored through high definition cameras and e-challans can be generated and send through the SMS to the owners of the vehicles, an App can tell you when is your vehicle service is due along with its service schedule, we can control all the household smart devices through our mobile phone, wireless life-saving medical devices connected through the hospital servers etc. are few very good examples of IoT.
On the other hand, if IoT is beneficial for all of us in today’s Cyber-era, it has peril effects too, as IoT is not safe until it’s secure. IoT has various security and privacy concerns for the end users and that is why it has limited its propagation. Cyber Criminals or Hackers are well aware how to hack IoT devices and take control of them. Security is crucial for every user including businesses, Govt. etc. and every IoT advancement require secure and resilient policies to make secure environment to work.
To mitigate the imminent IoT attack, a user has to first understand the behavior of the system that is to be protected. For instance, the affected component should be disconnected from the network first, or a set of compromised passwords should be revoked, so as to stop the unusual behavior of the IoT device. But the onus does not end here as the end users should take technical and security precautions, including frequent changing passwords, installing latest and updated security patches as and when available and using security software to name a few.
Despite various advantages and disadvantages of IoT, the legal acumen regarding the IoT is insufficient due to lack of acquaintance amongst its users and service providers in this regard. Despite advancement in technology related crimes, the IoT environment continues to grow at an exceptional percentage rate and the legal jurisprudence should also be boosted and amendments should also be passed according to the latest technical usage and its related crimes. However, being IoT users we should follow strict security parameters to safeguard our data and information which may get compromised online with the Cyber Criminals and could be misused in this Cyber era.
In nutshell, if technology has given various advancements to all of us it has given peril effects too and it is very important to evaluate the risk factors which are associated with IoT and to prevent erroneous use of our personal data and information, as we do not know that from which source, our data has been leaked and who will be held responsible for the same, coz we are just the users and we have to analyse the impact of law and all the legal implications on our data protection and privacy.
To consult or to take any legal advice you may email me personally at advmukulgirdhar@gmail.com or call +91-9811572430.
Online Security is the best countermeasure..