How can I better evaluate the security and privacy risks of the wearables product I am considering buying?
Since data from wearables are not regulated by law, it is important for you to evaluate the risks and benefits for yourself. While there is no single framework to evaluate these products, organizations like the Mozilla Foundation have developed ratings for wearables from a security and privacy perspective. You can use the following metrics to evaluate the risks:
- Sharing practices followed by the company: Your data might not be shared at all for commercial purposes or could be shared in a de-identifiedA record in which identifying information is removed. Under the HIPAA Privacy Rule, data are de-identified if either: an experienced expert determines that the risk that certain in... More format.
- Collection of location and biometric data‘Biometrics’ describes the physiological and behavioral characteristics of individuals. This could be fingerprints, voice, face, retina and iris patterns, hand geometry, gait o...: Given the nature of these products, they almost always collect biometric and location data. The more of this data it collects, the greater your exposure.
- Collection of unnecessary or excessive data: A product that automatically or manually collects data about you that is not required for the service it provides is riskier. For example, products that collect your location data even when you are not using them expose you to greater risk than products that collect only that data that is required to power its technology or analytics
- Encryption and updates: A product that adopts encryption at rest and in transitData encryption helps prevent unauthorized users from reading data on a cluster and associated data storage systems. This includes data saved to persistent media, known as data at ... More along with regular updates to its security infrastructure is more secure.
- Strong passwords: Since wearables are typically connected to a mobile application, it is important that they follow strong password protection protocols.
Please read more here .