The Internet of Things: Issues and advice
The Internet of Things is the network of Internet-connected devices that are able not only to communicate with humans, but also among each other. These devices collect, transmit and process data.
What is the Internet of Things?
The Internet of Things is the network of Internet-connected devices that are able not only to communicate with humans, but also among each other. These devices collect, transmit and process data.

Today’s connected devices are useful in all sorts of ways. Security cameras allow us to monitor our homes remotely; we can use personal voice assistants to adjust the lighting and temperature in our homes; smart watches make it possible to monitor data related to our health.

Issues
Data collection
Connected devices are equipped with sensors that collect data producedby you and your environment. You may find the amount of information they collect surprising!

The circulation of personal data
The data your objects collect is likely to spread on the Internet. It will be hosted on the cloud computing. It will be used by companies to offer you services. It may also be used for other purposes. In some cases it will be communicated to third parties.

The data collected says a lot about you
The data collected by connected objects can tell us a lot about you. They can reveal where you go, your lifestyle and your state of health.
Companies use this data for a number of reasons: to offer you a connected object with new functions, to contact you, to ensure that the advertising presented to you on the Internet targets you more precisely. Companies sometimes pass on this data to third parties so that they can do the same. Under Canadian law, data collected by connected objects may be considered personal information.
When companies collect, use or disclose your personal information, they have a legal obligation to protect it, in particular by adopting appropriate security measures. They must also explain what they will do with your personal information and obtain your consent.
For more information, please consult the resources available on the Office of the Privacy Commissioner of Canada website.

Poor security
Cybersecurity experts and Canadian government authoritiesare worried about the security of connected devices, and rightly so.There have been many instances in recent years when hackers haveexploited flaws in the Internet of Things. The lack of proper securitymeasures could expose you to information theft or to losing controlover your connected device.
Source: The Guardian
Commission d'accès à l'information du Québec

An army of zombies
In the fall of 2016, a number of popular sites including Twitter,Amazon and Airbnb were made inaccessible for a few hours asthe result of a cyberattack. What caused it? Millions of poorlyprotected connected devices were transformed into a vast networkof zombie machines (a “botnet” network) by a malware known as Mirai.Similar attacks could happen again as hackers continue to develop newmalware able to exploit loopholes in the Internet of Things.
Source: MIT Technology Review

Snooping cameras
Tens of thousands of private surveillance cameras transmitimages to the Internet without the owner’s knowledge. In fact,there are websites on which you can view, in real time, imagesshot in stores or private homes. On these sites, you can evenpinpoint the geographic location of the security cameras. This ismade possible by the fact that the cameras’ owners have used thedefault username and password that were provided with their smartdevices, thus making them particularly easy to hack.
Source: Journal de Montréal

Monitors that talk to children
In 2016, parents heard a voice coming from their baby’s room.Hackers had taken control of a baby monitor, allowing them to talkto the child and change the angle of the camera. Since 2015, a studyby the firm Rapid7 has resulted in corrections to several digitalvulnerabilities in baby monitors sold by major retailers. The hackerswere able to obtain data that gave them access to user-created accountsand allowed them to view recorded videos.
Source: Huffington Post


Worldwide, 127 connected devices are pluggedinto the Internetevery second

There will be about 3.4 connected devicesper person by 2020

Roughly 1 out of every 4 Canadians uses a connected device to measure health-related data
Source: Statista
Tips

Best security practices
When it comes time to purchase or use a connected device,it is important to take certain precautions. Secure your devicesand exercise caution when using them. as Secure your home network.

Secure your home network
Make sure your router and modem are up-to-date. The proceduresfor performing the updates can usually be found on the company’s website.
Make sure your home network uses the WPA2 security protocol.This is the protocol selected when configuring most modern routers.If your router does not permit the use of WPA2, exchange it for a new one.
Change the default name given to your home Internet(also known as “Service Set Identifier” or “SSID”). Failure to doso may mean that your network is not secure. Avoid using a namethat could be used to identify you or the place where you live.

Learn about your connected devices
Not all companies collect the same information or implementthe same security measures. Before purchasing a connected device,learn about the company’s practices and mechanisms for protectingyour personal information. You need to feel reassured by the informationyou receive.

Questions to ask about connected objects
Visit the connected object manufacturer's website and make sure you get satisfactory answers to the following questions:
- What data does the company collect? Why is this data collected?
- Will my data be transferred or sold to third parties? What are the reasons for this?
- What security measures has the company put in place? For example, will communications between the connected object and my phone be encrypted?
For additional information, please consult the privacy policy on the company's Web site. The Office of the Privacy Commissioner of Canada suggests several important points to consider.
Don't hesitate to consult forums and other computer resources that can guide you in purchasing a product. Magazines like Protégez-Vous or Consumer Reports can help.
If you have any unanswered questions, please do not hesitate to contact the company. Contact details can usually be found on the company's website or in its privacy policy. If the manufacturer doesn't answer your questions, it may be best to buy another product.

Secure your connected devices
You must secure access to your connected device andconfigure its privacy settings during the initial setup procedure.Unless you personally change these settings or they are updatedby the company itself, they will remain the same for the life of useof the connected device.

About the security of your connected objects
During the initial configuration from your smartphone, feel free to refuse some of the authorizations requested to access your personal information. In some cases, the connected object can still be used.
Make sure your connected object's software, firmware and application are up to date. If you're not sure, visit the company's website. If possible, adjust the settings on your smartphone or computer to enable automatic updates.
Make sure you have changed the default user name and password supplied with the connected object.
Avoid using the same password for all your connected objects. To make sure you don't forget your passwords, consider using a password manager.
The National Institute of Standards and Technology recommends that you use an easy-to-remember phrase when creating your passwords.
Once the connected device is set up, it is easy to forget that it is collecting and transmitting data, often continuously.
Precautions for use
Precaution 1
Check regularly that your connected devices and their apps are up to date.You can usually do this by visiting the company’s website.
Precaution 2
If you do not use a connected device regularly, turn off its microphone and camera.
Precaution 3
Before leaving your home fora long time, unplug your connected devices.
Precaution 4
Make sure that your contact information is up-to-date in the app for your connected device. The privacy policy can be sent to you by email. You may receive notifications of security updates.
Precaution 5
Check if the retailer still offers support for your connected device. If updates are no longer provided, avoid using the device.
Precaution 6
Before, recycling, selling, or disposing of your connected device, make sure thatyou have removed all your personalinformation (this can be found both in thedevice itself and in the app), then reset thedevice’s parameters. You should also deletethe account related to the connected device.
Resources to help you out
Understanding your privacy rights
How to protect your personal information
To file a complaint concerning the protection of your personal information
To report a cyber security incident
Learn more about the challenges of the Internet of Things: