Develop IoT products that meet the GDPR requirements, you don't know me to tell you

In the era of the Internet of Everything, there are some professions that may be familiar and unfamiliar to the public, such as mobile phones, household appliances, smart home equipment engineers, and product developers. As devices connect more people's lives, the personal information and data that are born also increase, and enterprises and product developers undoubtedly face huge information utilization and security management crisis.

Develop IoT products that meet the GDPR requirements, you don't know me to tell you

IoT product development, the most easy to ignore information security

According to the report, China currently has more than 1 billion Internet users, and each person may have multiple smart devices connected at the same time, so it may evolve into 5 billion units, possibly 10 billion units of devices, and the data generated by so many devices will A person becomes more and more transparent. When the cloud era comes, these personal user information can guarantee sufficient security, which will determine the vitality of an IoT product, and even seriously affect the success or failure of a company.

In the development process, the product code, system interface monitoring, system maintenance program, data monitoring, data analysis and cleanup should be evaluated before being officially released for use. The process of information call, data feedback, server monitoring and tracking after the release of the online line has become a major way for personal data leakage or information to be invaded.

Information security can be divided into three levels:

Information level: In simple terms, it focuses on traditional security areas such as communication encryption and password reinforcement.

User level: That is to say, user information is stored on the server, and how to ensure privacy is not violated.

At the architectural level: how to ensure that information is not lost.

Many enterprises or developers often only protect the security at the first information level, and they do not necessarily adopt the latest and most advanced technical standards or protocols for communication encryption. Vulnerabilities, the basic "back pot" is the product development related personnel.

Develop IoT products that meet the GDPR requirements, you don't know me to tell you

IoT product development, the most difficult is technical requirements compliance

It is often said that the most difficult thing to do with a product is creativity.

In fact, creativity is everywhere. For Internet of Things products, the most difficult thing is whether the technical level is compliant. Think deeply. It’s even worse to tell you that you are not compliant. You don’t know how to correct it. .

In terms of technical regulations and laws, in fact, some important international standard agreements have already been launched. The BSI British Standards Association officially released the Personal Information Management System (PIMS, BS 10012) in 2009. It is a management system for the protection of personal information, mainly for companies or organizations that manage or use personal information, in order to protect personal privacy. This standard specifies the requirements for a personal information management system and reduces the risks associated with organizational operations and compliance.

The European Union is about to fully implement the General Data Protection Act (GDPR) on May 25, 2018. The bill explicitly requires that personal or data should be protected regardless of whether it is directly or indirectly recognized by individuals. Business needs, personal data collected, processed, and utilized. So, everyone will think that looking for a team of legal consultants is not enough to complete information security?

For example, Facebook, which has recently been caught in the information security storm, held a conference in May to launch a new feature of “one-click clearing”, which is convenient for users to quickly clear browsing information and greatly reduce the acceptance of advertising information, and is also preparing for the EU data bill. More corresponding privacy control details.

Such a platform giant does not lack product creativity, does not lack the number of users, does not lack the demand reflection, but falls on the "information security" level. It is conceivable that in the era of big data, relying on a team of legal consultants is not enough. Because the consumer is completely unaware of what data he has handed over to the manufacturer, and does not know how the vendor handles the data, security cannot be guaranteed. Once the word of mouth is destroyed, or the user will no longer trust you, he will not choose you, if not From the fundamental solution to information security protection, it will pay a heavy price.

Therefore, it is not enough to understand the EU's personal privacy protection laws and regulations, because the most urgent problem that enterprises need to solve now is how to solve the problem of product and service compliance in terms of technology.

Develop IoT products that meet the GDPR requirements, you don't know me to tell you

Then someone would think that information security is what Internet security companies do. In fact, any Internet company, including companies that now do hardware, will eventually become an Internet service company, and users will use these devices to generate large amounts of data. Therefore, any Internet company has the responsibility to protect the security of user information, and to encrypt user data in the cloud with sufficient strength, including secure storage and secure transmission, which involves many knowledge points and costs.

For the knowledge point, the enterprise does not know whether the knowledge points and information security methods that it has are sufficient to meet the current regulations or standards; in terms of cost, it is very costly to prepare for these problems before they are taken. Energy, under the premise of not knowing the standard requirements and regulatory requirements, will not and should not be rushed to avoid waste of resources.

Information security is not a problem for a company, nor is it a problem for several security companies. It is a matter of mutual promotion from the giants to various Internet companies and product suppliers and service providers. With the accelerated development of domestic and foreign transactions and product promotion, the optimization of information security is imminent.

IoT product development requires a technical interpretation of the GDPR Act

When a general enterprise or individual responds to the GDPR bill, some legal institutions can now interpret it from a legal level. Where is the product of the enterprise legal and illegal, but from the technical point of view of product development, how to make it change Legitimate, this requires a professional technical service organization like the SCA Alliance to provide product development technical compliance advice on corporate products that meet the GDPR requirements.

On June 11, 2018, at the Grand Mercure Shanghai Zhengda Hotel, the “GDPR EU General Data Protection Act (EU Personal Privacy Protection Act) Basic Analysis Conference” hosted by the SCA Alliance will be held soon. From the framework level, how to technically meet the requirements of GDPR. Improve understanding of personal data management activities, assist organizations in promoting relevant development and management, and understand the differences between current personal data management and international standards and laws and regulations, and continue to strengthen management capabilities.

Welcome to participate in management system activities, corporate governance, product technology development, policy development managers, management system representatives, auditors, operational risk management related managers, legal and compliance personnel, etc.

Develop IoT products that meet the GDPR requirements, you don't know me to tell you

About the SCA Secure Communications Alliance:

SCA Secure Communications Alliance (SCA) is a neutral, professional and open service, technology, trend and other information exchange and product service platform jointly initiated by enterprise decision-making personnel at different business levels in the secure communication and secure identity authentication industry chain. The alliance has more than 50 corporate members from six countries.

SCA is the first organization in the world to take the lead in developing international technical specifications for smart home information security in accordance with the international information security standard ISO15408 (Common Criteria), and has active communication and communication with experts in the field of international information security.

University Laptop

What features you consider more when you choose an university laptop for project? Performance, portability, screen quality, rich slots with rj45, large battery, or others? There are many options on laptop for university students according application scenarios. If prefer 14inch 11th with rj45, you can take this recommended laptop for university. If like bigger screen, can take 15.6 inch 10th or 11th laptop for uni; if performance focused, jus choose 16.1 inch gtx 1650 4gb graphic laptop,etc. Of course, 15.6 inch good laptops for university students with 4th or 6th is also wonderful choice if only need for course works or entertainments.

There are many options if you do university laptop deals, just share parameters levels and price levels prefer, then will send matched details with price for you.

Other Education Laptop also available, from elementary 14 inch or 10.1 inch celeron laptop to 4gb gtx graphic laptop. You can just call us and share basic configuration interest, then right details provided immediately.

University Laptop,Laptop For University Students,University Laptop Deals,Recommended Laptop For University,Laptop For Uni

Henan Shuyi Electronics Co., Ltd. , https://www.shuyioemelectronics.com