Remove Consumer Protection Remove IoT Remove Manufacturing Remove Passwords
article thumbnail

SiteLock’s Top Five Cybersecurity Predictions For 2020

SiteLock

The CCPA aims to enhance privacy rights and consumer protection for California residents or any other organization that does business with California. Given the focus on protecting consumer privacy, the CCPA regulations will inevitably set the bar for an increase in cybersecurity policies.

article thumbnail

New IoT Security Regulations

Schneier on Security

Due to ever-evolving technological advances, manufacturers are connecting consumer goods­ -- from toys to lightbulbs to major appliances­ -- to the internet at breakneck speeds. It falls upon lawmakers to create laws that protect consumers. This is the Internet of Things, and it's a security nightmare.

IoT 228
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California Passes First Of Its Kind IoT Cybersecurity Law

Privacy and Cybersecurity Law

California recently became the first state in the union to pass a cybersecurity law addressing “smart” devices and Internet of Things (IoT) technology. The term IoT generally refers to anything connected to the internet, including smart home devices (e.g., Amazon’s Alexa, NEST thermostats, etc.). Code § 1798.91.05(c))

IoT 45
article thumbnail

California Passes First Of Its Kind IoT Cybersecurity Law

Privacy and Cybersecurity Law

California recently became the first state in the union to pass a cybersecurity law addressing “smart” devices and Internet of Things (IoT) technology. The term IoT generally refers to anything connected to the internet, including smart home devices (e.g., Amazon’s Alexa, NEST thermostats, etc.). Code § 1798.91.05(c))

IoT 45
article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

granting them access to live and archived video feeds across multiple organizations, including manufacturing facilities, hospitals, schools, police departments and prisons. For example: passwords being typed or posted, specific motions or commands used to activate control systems to open or unlock doors, etc.”.