Keeping A Lid On Your Data

Data Discretion

As discussed on CloudTweaks not too long ago, invisibility is the one thing that’s very important when bringing the Internet of Things to the kitchen. That is, the process of working a home appliance has to be convenient to the point of invisibility, just like it’s with tap water–it’s simply there when we need it, even if we don’t quite know how.

Then again, in this day and age we take ease of use for granted, because most non-techies wait until a new product has become convenient before going to the store. Furthermore, kitchen appliances are high-involvement purchases, and no one wants anything cumbersome or slow in their kitchen. It just has to work.

That’s why it can be argued that the most important thing for the way people will perceive IoT devices, both in their kitchens and in general, is this: what’ll happen to the data these devices generate? Let’s elaborate a bit. In a few years there will be millions of grown ups that have most of their lives documented on social networks. Millions of them will have been embarrassed by something they shared online, or perhaps something–like overly personal, intrusive ads or personalized spam–will have taught them the value of keeping touchy data to themselves. People are bound only to become more and more data-reticent in time.

This becomes crucially important for the long-term success of the IoT, because the data that will be recorded will become much more important once it’s recorded in our homes, not to mention when it’ll come right off our bodies as it is with wearables. It’s great if the fridge can remind us to get milk, a vending machine can help us stick to our diet, or a prep pad can suggest us something healthy to eat, but privacy issues are bound to spring up once a data-hungry app layer is added upon the digital ecosystem of our homes.

This was the case when people raised privacy concerns with the Nest acquisition by Google. The reason is quite evident: it’s just too close to home. And that’s the case with all of the household IoT devices. Even though benign and beneficial, there’s increased tension to know what exactly happens with the data pulled from the sensors. We wouldn’t want to have to scratch our heads if we find a weight watchers ad in our mailbox a month after we’ve started using our smart fridge.

The solution is simple: more user control over data. Not only should users control what data to share, but with whom to share it. Companies should be very conscientious about this, but in return they might find that their user base is much more cooperative. If inchoate policies like the “New Data Deal” come to fruition, perhaps we’ll see a future that’s clearer in terms of what we’re giving away and what, exactly, we’re getting in return.

By Lauris Veips

Viral Infection Wearabletech
Data Fallout.png
Recovery Experts.png
Disaster Recovery Plan.png
Jennifer Nwokolo
Risk Assessment and Management Risks are inevitable in every business venture. Generally, most organizations aim to identify and evaluate their risks before investing. Hence, the need for a risk assessment and management solution. Businesses will ...
Dana Gardner
We’re all now part of a massive worldwide experiment about the very definition of work. Remote, in-office — or tightrope walking along some sliding scale between the two? How each business and each worker finds the ...
Security Breach 10 Useful Cloud Security Tools
Cloud Security Tools Cloud providing vendors need to embed cloud security tools within their infrastructure. They should not emphasize keeping high uptime at the expense of security. Cloud computing has become a business solution for ...
Joseph Carson
Compromised Identities Most of what we encounter every day is computerized. We connect to the internet on our phone or make a purchase with an internet-connected processor, leaving us at risk of a malicious hacker ...
Why cybersecurity spending Is resilient Cybersecurity tech stacks must close the gaps that leave human and machine endpoints, cloud infrastructure, hybrid cloud and software supply chains vulnerable to breaches. The projected fastest-growing areas of cybersecurity ...