IOT In Women And Child Safety
- Debjoyti Louha
- May 14, 2021
- 4 min read
The Pew Research Center released a report questioning experts on the security implications of the Internet of Things. In an effort to protect Americans from dangerous products, EPIC has written to the House Commerce Committee saying that the Consumer Product Safety Commission must do more to not only protect consumers, but also ensure the safety of IoT devices. EPIC says that Internet-connected door locks and thermostats, as well as smartwatches, are crucial for American consumers and the role of the US government in protecting them, and calls on the Consumer Product Safety Commission to regulate IoT products. [Sources: 9]
EPIC recommends that the Commission implement the thirteen rules laid down by the UK Government for IoT equipment manufacturers. EPIC also recommends new safety rules for connected vehicles and recommends the introduction of new rules for smartwatches and smart thermostats. [Sources: 9]
Connected components form a network of connected devices such as smartwatches, smart thermostats and smart toys. Many of these technologies are used in children's homes, schools, workplaces and other public facilities, and the devices are designed to provide a safe zone for children. The best approach to protecting children is for parents to be involved in how their children learn to use these devices and online services, whether they are parents or children themselves. IoT device manufacturers and smart toy manufacturers are responsible for protecting children's data, whether it is regulated and protected or not. [Sources: 1, 4, 5, 13]
This can be divided into three categories: children, adults and children and adults, as well as their equipment and toys. [Sources: 7]
The Internet of Things refers to devices that are connected and can be controlled by devices or apps that can control themselves. Smarthome connectivity is when a smartphone is connected via the Internet and the device connects to others. IoT devices, because they rely on connectivity to work, create a way for hackers to gain access to the entire network. [Sources: 2, 9]
Depending on the function of different IoT devices, weak cybersecurity can lead to serious consequences, including physical damage and injury. IoT devices could be hacked with terrible consequences: there is a high risk that hacking these devices could cause serious damage to the device and lead to physical injury or death. [Sources: 9]
Other vulnerable devices include IoT cameras that can secretly record audio and video, HVAC systems that control heating and cooling levels, and alarms that can provide information about temperature, humidity, wind speed, and humidity in the home. IoT sensors are sent to the dashboards of Zyter Smart Factories as well as to other devices such as smart thermostats and smart lighting. [Sources: 3, 9]
The ability to track the location and safety of children and pets can help reassure survivors that their loved ones are safe and healthy. With the technology that has been available lately, it is not difficult to build a safety device for women that triggers an emergency call and sends a message to friends, family or a person affected. In a country where safety, especially among women and children, remains a major concern, devices that help parents connect with their children can serve as a glimmer of hope. [Sources: 2, 7, 8]
EPIC recommends that the UK government adopt basic rules for IoT device manufacturers and proposes a law requiring companies to use technologies to improve privacy, promote data minimisation and ensure the security of IoT devices. If you have smart devices at home or at work, read more about it and use network security technology. We work with cybersecurity and intelligence services to collect data on protocols that would make IoT products safer for consumers and businesses. [Sources: 9, 12, 13]
It uses standard protocols, does not contain heavily encrypted passwords, is patchable and contains no known vulnerabilities. IoT device manufacturers that sell products to the federal government must commit to safety standards for their IoT devices. [Sources: 9]
Users can unlock the smart Mortise 2.0 with a hidden biometric sensor, and the system should connect to a child's school ID card to track and track their movements on school grounds using RFID tags. The smart watch should detect the movements of the child as well as the presence of other children in the environment. [Sources: 5, 6]
While IoT brings many benefits to consumers, from monitoring babies to finding lost pets, it also carries risks. IoT technology is an upside outlier that never returns, and as we see it is important to take a look at what makes these devices so vulnerable. Before you buy a new IoT device and take it home, you should therefore consider whether you really benefit from it. [Sources: 0, 12, 13]
The safety of children is at the heart of building a good and powerful nation, and the future of the global economy and its citizens. [Sources: 5]
In the current global scenario, women face many problems with harassment, and we are focusing on the use of IoT - software that helps police keep children and women safe. We have started the work that we have deliberately done - solutions for securing IoT devices and networks to protect women and children, and to protect children and women at work. We have also started to produce a report on the impact of the new child-friendly Google Play Store, which will examine how it is managed, accessed and how users change the user interface. [Sources: 4, 10, 11, 13]
Sources:
[0]: https://blog.radware.com/security/2016/12/nine-questions-to-determine-iot-device-safety/
[1]: https://cio.economictimes.indiatimes.com/news/digital-security/iot-based-smart-toys-pose-safety-risks-to-kids-and-their-parents-security-experts/50958644
[2]: https://www.techsafety.org/smart-toys
[3]: https://www.eejournal.com/industry_news/zyter-introduces-smart-factories-iot-solution/
[4]: https://www.engpaper.com/women-safety-system.htm
[5]: http://www.yuvaengineers.com/iot-based-child-safety-management-using-raspberry-pi-and-rfid-technology-dr-b-prabhakar/
[6]: https://www.raconteur.net/technology/internet-of-things/iot-innovations-ces/
[7]: https://circuitdigest.com/microcontroller-projects/arduino-based-women-safety-device-for-emergency-alert-and-tracking
[8]: https://www.entrepreneur.com/article/279714
[9]: https://epic.org/privacy/internet/iot/
[10]: https://eandt.theiet.org/content/articles/2018/06/iot-devices-and-smart-domestic-abuse-who-has-the-controls/
[11]: https://indiaai.gov.in/article/iot-is-transforming-safety-for-women-and-children
[12]: https://www.finance-monthly.com/2019/09/the-worst-and-weirdest-iot-hacks-of-all-times/
[13]: https://blog.malwarebytes.com/101/2017/12/internet-things-iot-security-never/

Comments