Question

Hello, Need my paper proof read, I have problems with my paper structure. I need help...

Hello, Need my paper proof read, I have problems with my paper structure. I need help with my flow as I feel as if my analysis is not iter mixing with the my paper. For example currently I have citation, citation, example, then my analysis. I need help restructure my paper for better flow. I have copied and pasted my paper for review below:

Smart home devices have been a growing trend in the Canadian market with approximately 18% of Canadians investing in these devices in late 2018. It is estimated that by 2023, 35.1% of Canadians will use smart home devices (Ross, 2019). The rapid growth of these devices in Canada poses both a privacy and a cybersecurity risk to all citizens using these devices, as they are connected to the “internet of things” or IoT. Currently, Canadian laws offer little to no protection with these devices because privacy laws are nowhere near substantial enough for regulations to be implemented. This gives the opportunity for smart home manufacturers to regulate their own privacy and security policies, which creates a significant risk to consumers using their devices. With no regulations, manufacturers are emboldened to continue with this practice, and therefore, it is imperative that the Canadian Government creates laws and regulations that protect the privacy of citizens, and develops regulations for companies that offer IoT devices to fulfill the right of privacy.

In modern-day technology, most electronic devices such as smart home devices, fitness trackers, and even smart televisions use an online framework called “the internet of things” or IoT. The internet of things devises the networking of electronic devices, allowing them to connect through the internet, and enabling them to send and receive data (Maras, 2017). The IoT framework also has the capabilities to collect, store, and transmit vast amounts of data linked to your personal activities, such as your everyday routine, including your personal information (Ernst & Young, 2017). With IoT frameworks technology expanding, it provides consumers with more convenience and a technology-based lifestyle, but also has created an unprecedented consequence as it is getting harder to control third-party hackers from gaining access to connected devices (Ernst & Young, 2017). With the added issues of outdated laws and regulations that are intended to protect the privacy and security of personal information, it has created breaches in Canada’s technology sector.

Take for example, an organization called “Scalar Decisions,” a team of ethical hackers who hack smart home devices to showcase their flaws. In a study conducted by “CBC Marketplace,” ethical hackers were hired to hack numerous families with smart home devices (Denne, 2018). In one instance, the hackers managed to gain access to a family’s home wireless network where devices such as thermostats were linked to the network. After breaching the wireless network, they controlled the thermostats and also could gain access to other devices, such as smart door locks. The study also identified websites like “Insecam” that live-stream thousands of wireless security cameras that are connected to the IoT framework and found the site hosting approximately 300 Canadian feeds, broadcasting online for anyone in the world to see.

These examples of security and personal breaches show the current issues we have in Canada in regards to personal privacy and security. If manufacturers are selling these products in the Canadian market, the government must enforce regulations and standards to protect the individuals who use such devices. The study conducted by CBC Marketplace shows how rough the situation currently is in Canada. The Canadian Government should put in resources to better combat the fast-changing technology sector, to decrease the limit of occurrences and patch any gaps in our current privacy laws. This raises the question of why the Canadian Government has not put in the resources to update current privacy and security laws and also raises the question of who should be liable for these issues: the manufacturers, hackers, or the Canadian Government.
Perhaps one of the main issues in Canada is the current Personal Information Protection and Electronic Documents Act (PIPEDA). The PIPEDA “is the federal privacy law for private-sector organizations, which sets out the ground rules for how businesses must handle personal information in the course of commercial activity” (Office of the Privacy Commissioner of Canada, 2018). However, even with this act, most manufacturers do not follow these regulations, and thus the reason why we see a variety of different privacy policies across companies. This is mainly due to the PIPEDA conception in the year 2000, and with 19 years of technology advancements, the original act focuses on early versions of IoT framework, and it is no surprise that the current IoT framework no longer applies to the act due to the outdatedness of its policies.

For instance, the outdated PIPEDA was recognized by the former Privacy Commissioner Jennifer Stoddart; she expresses an opinion that the current PIPEDA is outdated and needs a major overhaul and further asserts that the privacy framework is much more complex than a decade ago (Allison, 2018). Furthermore, the current Privacy Commissioner Daniel Therrien stated that privacy concerns are reaching near-crisis levels and is calling the federal government for an immediate reform (Office of the Privacy Commissioner of Canada, 2018).

The current PIPEDA is nowhere near strong enough to regulate companies to follow specific privacy laws in Canada, weakening the privacy of Canadians. If the federal government took the initiative to reform the PIPEDA based on the Privacy Commissioner’s concerns, companies would have laws and regulations they must follow. If there is no clear regulation and law set out in the act, it is no surprise that companies such as smart home manufacturers are using this to their advantage to enforce their own privacy policies, as there are no updated regulations or laws these companies have to follow and therefore they are not being penalized. This can be put into context in society, imagine if there were no laws that citizens must follow, this would cause significant consequences as there would be no order kept in society. This connects in the same way with current smart home manufacturers as they have no law or regulations to follow, therefore creating no order in the technology sector. If there are any existing laws or regulations, they are outdated and no longer valid for the current IoT framework.

Smart home device manufacturers' privacy and security policies pose a multitude of concerns. When smart home users first set up their devices, they have limited control over the type of data the manufacturer may collect, and most manufacturers are located within the United States, resulting in data being stored in servers in the U.S. (Biocco, 2018). Manufacturers use smart home data to build profiles of users for marketing and advertising purposes to generate revenue (Biocco, 2018). However, this creates security risks as third-party hackers may gain access to personal information by obtaining unencrypted information generated by these devices by using wireless data intercept tools and over radio-frequency protocols (Fichtner, 2018). Most manufacturers' privacy policies do not have an option for users to “opt-out” of personal data collection or manage data sharing preferences (Zhang, 2016). In conjunction with privacy policies, smart home privacy policies are tough to read and comprehend; within the policies, opt-out procedures are non-existent or tedious to execute (Biocco, 2018).

Take for example, a company called “Ring,” which manufactures smart doorbells and cameras. In its privacy policy, it states that they refuse to let users opt-out of personal data collection because it offers payment services and is beyond the standard package (Ring LLC, 2018). Users have no choice but to agree and hand over their personal information to allow this company to collect data. Another instance is a company called “Google.” Google states on its privacy policy that it does not sell your personal data; however, it collects and manages personal data, including smart home devices such as the “Google Home,” and uses that data within its systems to show advertisers to generate revenue (Popken, 2018).

The statements in both Ring’s and Google’s privacy policies show that currently, companies have control over how personal data are used and managed. However, both of these companies are located within the United States, and if personal data is being stored in a different country than the user, this creates further implications in Canada that we have no control over the data being sent to these companies. If Canada had strict regulations and laws that companies must follow, such as being transparent on data management, we would not see the current monopoly in the technology sector.

With technology advancements in the IoT framework, laws and regulations must be passed on companies offering services in Canada. Without laws and regulations, companies will enforce their own policies due to the aging PIPEDA act in Canada. The federal government must take the initiative to update the policies within this act, allowing companies to follow specific regulations in regard to privacy and security. They must also govern resources to keep up to date with the sophisticated IoT framework and fulfill the privacy and security rights of all Canadian citizens, which are currently not being met.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

In modern-day technology, most electronic devices such as smart home devices, fitness trackers, and even smart televisions use an online framework called “the internet of things” or IoT. The internet of things devises the networking of electronic devices, allowing them to connect through the internet, and enabling them to send and receive data (Maras, 2017). The IoT framework also has the capabilities to collect, store, and transmit vast amounts of data linked to your personal activities, such as your everyday routine, including your personal information (Ernst & Young, 2017).

Smart home devices have been a growing trend in the Canadian market with approximately 18% of Canadians investing in these devices in late 2018. It is estimated that by 2023, 35.1% of Canadians will use smart home devices (Ross, 2019). The rapid growth of these devices in Canada poses both a privacy and a cybersecurity risk to all citizens using these devices, as they are connected to the “internet of things” or IoT. Currently, Canadian laws offer little to no protection with these devices because privacy laws are nowhere near substantial enough for regulations to be implemented. This gives the opportunity for smart home manufacturers to regulate their own privacy and security policies, which creates a significant risk to consumers using their devices. With no regulations, manufacturers are emboldened to continue with this practice, and therefore, it is imperative that the Canadian Government creates laws and regulations that protect the privacy of citizens, and develops regulations for companies that offer IoT devices to fulfill the right of privacy.

With IoT frameworks technology expanding, it provides consumers with more convenience and a technology-based lifestyle, but also has created an unprecedented consequence as it is getting harder to control third-party hackers from gaining access to connected devices (Ernst & Young, 2017). With the added issues of outdated laws and regulations that are intended to protect the privacy and security of personal information, it has created breaches in Canada’s technology sector.

Take for example, an organization called “Scalar Decisions,” a team of ethical hackers who hack smart home devices to showcase their flaws. In a study conducted by “CBC Marketplace,” ethical hackers were hired to hack numerous families with smart home devices (Denne, 2018). In one instance, the hackers managed to gain access to a family’s home wireless network where devices such as thermostats were linked to the network. After breaching the wireless network, they controlled the thermostats and also could gain access to other devices, such as smart door locks. The study also identified websites like “Insecam” that live-stream thousands of wireless security cameras that are connected to the IoT framework and found the site hosting approximately 300 Canadian feeds, broadcasting online for anyone in the world to see. These examples of security and personal breaches show the current issues we have in Canada in regards to personal privacy and security. If manufacturers are selling these products in the Canadian market, the government must enforce regulations and standards to protect the individuals who use such devices.

The study conducted by CBC Marketplace shows how rough the situation currently is in Canada. The Canadian Government should put in resources to better combat the fast-changing technology sector, to decrease the limit of occurrences and patch any gaps in our current privacy laws. This raises the question of why the Canadian Government has not put in the resources to update current privacy and security laws and also raises the question of who should be liable for these issues: the manufacturers, hackers, or the Canadian Government.
Perhaps one of the main issues in Canada is the current Personal Information Protection and Electronic Documents Act (PIPEDA).

The PIPEDA “is the federal privacy law for private-sector organizations, which sets out the ground rules for how businesses must handle personal information in the course of commercial activity” (Office of the Privacy Commissioner of Canada, 2018). However, even with this act, most manufacturers do not follow these regulations, and thus the reason why we see a variety of different privacy policies across companies. This is mainly due to the PIPEDA conception in the year 2000, and with 19 years of technology advancements, the original act focuses on early versions of IoT framework, and it is no surprise that the current IoT framework no longer applies to the act due to the outdatedness of its policies.

For instance, the outdated PIPEDA was recognized by the former Privacy Commissioner Jennifer Stoddart; she expresses an opinion that the current PIPEDA is outdated and needs a major overhaul and further asserts that the privacy framework is much more complex than a decade ago (Allison, 2018). Furthermore, the current Privacy Commissioner Daniel Therrien stated that privacy concerns are reaching near-crisis levels and is calling the federal government for an immediate reform (Office of the Privacy Commissioner of Canada, 2018).

The current PIPEDA is nowhere near strong enough to regulate companies to follow specific privacy laws in Canada, weakening the privacy of Canadians. If the federal government took the initiative to reform the PIPEDA based on the Privacy Commissioner’s concerns, companies would have laws and regulations they must follow. If there is no clear regulation and law set out in the act, it is no surprise that companies such as smart home manufacturers are using this to their advantage to enforce their own privacy policies, as there are no updated regulations or laws these companies have to follow and therefore they are not being penalized. This can be put into context in society, imagine if there were no laws that citizens must follow, this would cause significant consequences as there would be no order kept in society. This connects in the same way with current smart home manufacturers as they have no law or regulations to follow, therefore creating no order in the technology sector. If there are any existing laws or regulations, they are outdated and no longer valid for the current IoT framework.

Smart home device manufacturers' privacy and security policies pose a multitude of concerns. When smart home users first set up their devices, they have limited control over the type of data the manufacturer may collect, and most manufacturers are located within the United States, resulting in data being stored in servers in the U.S. (Biocco, 2018). Manufacturers use smart home data to build profiles of users for marketing and advertising purposes to generate revenue (Biocco, 2018). However, this creates security risks as third-party hackers may gain access to personal information by obtaining unencrypted information generated by these devices by using wireless data intercept tools and over radio-frequency protocols (Fichtner, 2018). Most manufacturers' privacy policies do not have an option for users to “opt-out” of personal data collection or manage data sharing preferences (Zhang, 2016). In conjunction with privacy policies, smart home privacy policies are tough to read and comprehend; within the policies, opt-out procedures are non-existent or tedious to execute (Biocco, 2018).

Take for example, a company called “Ring,” which manufactures smart doorbells and cameras. In its privacy policy, it states that they refuse to let users opt-out of personal data collection because it offers payment services and is beyond the standard package (Ring LLC, 2018). Users have no choice but to agree and hand over their personal information to allow this company to collect data. Another instance is a company called “Google.” Google states on its privacy policy that it does not sell your personal data; however, it collects and manages personal data, including smart home devices such as the “Google Home,” and uses that data within its systems to show advertisers to generate revenue (Popken, 2018).

The statements in both Ring’s and Google’s privacy policies show that currently, companies have control over how personal data are used and managed. However, both of these companies are located within the United States, and if personal data is being stored in a different country than the user, this creates further implications in Canada that we have no control over the data being sent to these companies. If Canada had strict regulations and laws that companies must follow, such as being transparent on data management, we would not see the current monopoly in the technology sector.

With technology advancements in the IoT framework, laws and regulations must be passed on companies offering services in Canada. Without laws and regulations, companies will enforce their own policies due to the aging PIPEDA act in Canada. The federal government must take the initiative to update the policies within this act, allowing companies to follow specific regulations in regard to privacy and security. They must also govern resources to keep up to date with the sophisticated IoT framework and fulfill the privacy and security rights of all Canadian citizens, which are currently not being met.

Add a comment
Know the answer?
Add Answer to:
Hello, Need my paper proof read, I have problems with my paper structure. I need help...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • I need a summary and your thought about this article. Ethics In The Digital Age: Protect...

    I need a summary and your thought about this article. Ethics In The Digital Age: Protect Others' Data As You Would Your Own It has been a year since the European Union implemented its General Data Protection Regulation (GDPR), a landmark privacy law aimed at curtailing the widespread use of personal information – without the full understanding or consent of the people concerned– for monetary gain, especially by major tech companies. What seemed bold and daring in 2018 is being...

  • ***I only need the High Level Project Plan (Time to Implement)****** You have recently been hired...

    ***I only need the High Level Project Plan (Time to Implement)****** You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director ofInformation Systems and Telecommunications. Your assignment is to assist security posture of the firm anddevelop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO. The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India andCalifornia....

  • Area Act Date Description Telecommunications Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act...

    Area Act Date Description Telecommunications Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act of 1934 (47 USC 151 et seq.) 1934 Regulates interstate and foreign telecommunications (amended in 1996 and 2001) Civil legal evidence Federal Rules for Civil Procedure (FRCP) 1938 As updated in 2006, specifies requirements for the storage, protection, and surrender of discoverable electronic data as used in federal civil proceedings Freedom of information Freedom of Information Act (FOIA) 1966 Allows for disclosure of previously...

  • I need your thoughts about this article. Pew Research recently reported that “roughly six-in-ten U.S. adults...

    I need your thoughts about this article. Pew Research recently reported that “roughly six-in-ten U.S. adults say they do not think it is possible to go through daily life without having data collected about them by companies or the government.” Andrew Hawn, my former colleague and now founder of MetaForesight, is a technology, media and content expert. Andrew has been collaborating with my analytic startup, Metametrix, and we recently spoke about privacy and its far-reaching implications. “We’re seeing a social...

  • THE EFFECT OF TECHNOLOGY AND GADGETS ON OBESITY ABSTRACT The upgraded technology along with the surplus...

    THE EFFECT OF TECHNOLOGY AND GADGETS ON OBESITY ABSTRACT The upgraded technology along with the surplus availability of smart devices and gadgets added with the growing urbanization and increased access to conveniences had encouraged the development of a sedentary way of life. The study discussed the various factors and activities that engaged the present population and the remarkable change in technology usage. This study discussed the increase in the use of technologically advanced devices have had an effect on the...

  • I need a summary and your thought about this article. How to Safeguard Trust in the...

    I need a summary and your thought about this article. How to Safeguard Trust in the Digital Age? Data analytics, AI, and other tools of the digital age can help marketers improve CX, but they also may raise concerns about data usage and privacy. Brands have an opportunity to build trust by showing they use these technologies wisely—and always in service to the customer. Advanced technologies that gather and apply customer data can be significant differentiators for a brand—and their...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • The world’s 3 billion-plus smartphones emit the kind of data that health authorities covet during outbreaks....

    The world’s 3 billion-plus smartphones emit the kind of data that health authorities covet during outbreaks. They show where individuals are, where they’ve been and who they might have talked to or even touched — potentially offering maps to find infected people and clues to stopping new ones. But gaining access to this data, even amid a global pandemic, is made complex by the legal and ethical issues surrounding government access to information that can reveal intimate details about citizens’...

  • Read the article bellow an answer the question at the bottom. Broadcom Completes Acquisition of Symantec...

    Read the article bellow an answer the question at the bottom. Broadcom Completes Acquisition of Symantec Enterprise Security Business November 4, 2019 SAN JOSE, Calif., Nov. 4, 2019 /PRNewswire/ -- Broadcom Inc. (NASDAQ: AVGO), a global technology leader that designs, develops and supplies semiconductor and infrastructure software solutions, today announced that it has completed its acquisition of the Enterprise Security business of Symantec Corporation (NASDAQ: SYMC). Symantec's Enterprise Security business will now operate as the Symantec Enterprise division of Broadcom...

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
Active Questions
ADVERTISEMENT