The IoT Solutions World Congress in Barcelona is about to start and I will be there running a panel of legal issues of the Internet of Things (IoT), are you going to join us?
Remote monitoring of employeesย through tablets, smartphones, and other devices used as part of the working activity might be more accessible following the approval of changes to the Italian Workersโ Statute. But the scope of such change might have exciting developments regarding the Internet of Things and wearable technologies devices.
3D printing is expected to trigger a revolution in the market, but will lead to major legal issues in the areas of intellectual property, product liability and data protection.
The Italian Government has allocatedย โฌ 2.2 billion to the ultra-wide band project that requires investments also in relation to the IoT, smart cities and start ups.
After the recent events involving more than one hacked connected car, major car makers decided to create a joined alliance to coordinate their efforts against cyber attacks. ย But without any Governmental approval is the right strategy?
The Internet of Things (IoT) requires certainty and this is why the Online Trust Alliance (OTA) published a draft framework of privacy and security guidelines for IoT devices. ย Will regulators will validate that setting a more suitable playfield for the IoT?ย
The recent events of connected cars remotely hacked led to considerable discussions about the potential weaknesses of security systems of Internet of Things (IoT) technologies, whose growth cannot be stopped though.ย But how can we find the right balance?ย
Digital health has massive potentials, but its implementation requires to comply with standards that are now even more stringent after the issue of new guidelines by the Italian privacy authority.ย
What are the open questions of the Internet of Things (IoT) and how they will affect the future growth of the sector? Is the industry or regulators that have to find a response to that?
The cyber-attack suffered by Hacking Teamย revealed unexpected vulnerabilities of systems with considerable consequences for businesses whose cyber risk strategy shall be reassessed.