Policy And Legal Aspects About IOT Systems Assignment Sample

Policy And Legal Aspects About IOT Systems Assignment by New Assignment Help

  • 54000+ Project Delivered
  • 500+ Experts 24x7 Online Help
  • No AI Generated Content
GET 35% OFF + EXTRA 10% OFF
- +
35% Off
£ 6.69
Estimated Cost
£ 4.35
6 Pages 1383Words

Introduction of Policy And Legal Aspects About IOT Systems Assignment

Get free written samples from expert assignment writers and academic writing services in UK.

As technology advances and 5G is deployed, many different firms are developing IoT devices and systems to compete. However, most businesses overlook the importance of legal and policy considerations both during the creation of a system and after it has been sold to a consumer. In this work, we'll look at the problems, US and UK legislation, and solutions to something like an IoT system that monitors food consumption and body weight (Elvy, 2021). Designers should be aware of the dangers of computer misuse before they begin creating a system. As an example, consider the case of a phone application used to gather data from a scale in the kitchen or bathroom.

As a result, the end-users of the company's computers may readily abuse them. Phone application design, cooking meter and bathroom scale design and even full architectural system design are examples of copyright violations. System designers have a major difficulty when it comes to making sure they don't mimic the current system. A copyright infringement occurs when a system designer comes up with a design that is almost identical to an existing design. The designer firm will be charged with copyright infringement since they are said to have broken copyright laws.

The Laws

The UK Computer Abuse Act 1990 prohibits the unauthorised use of computer equipment without the owner's consent in cases of computer misuse. An employee's illicit use of an unauthorised computer to access and modify corporate data without the owners' approval is referred to as a computer misuse. The Computer Misuse Act of 1990 in the United Kingdom gives people the right to use unlicensed computer equipment if they are aware of the risks. This might result in the data being lost or corrupted because of this action.

Anyone detected accessing unlawful material on a legitimate computer will be deemed guilty and brought to justice. Every one of these potential hazards has been addressed in some manner by UK legislation thus far. The UK Copyright Act of 1988, which was revised in 2014, includes copyrights that safeguard the right to ownership of the system in the event of copyright infringement. Using the act as evidence, a person suspected of infringement of copyright will be prosecuted in civil court (Schreider, 2020). Copyright applies to all works relevant to system design under current government regulations.

It's illegal to duplicate someone else's copyrighted work without being registered as a copyright infringement. In the magistrate's court, one may be sentenced to six months in jail and/or a fine of €50,000, whereas in the Crown Court, one can be sentenced to ten years in prison and/or an unmeasured fine. To safeguard intellectual property, the Patent Act of 1977 is still in place, and it continues to do so. Another one that restricts individuals from adopting other system developers' ideas or creations to create their own systems is the UKIPO.

Patent infringement is a charge levelled against someone found guilty of breaching a patent's terms. Patents and copyrights are protected in the United States by a variety of laws. Protecting patent rights is one of the main goals of the Digital Millennium Copyright Act of 1998 (DCMA). Those who duplicate other people's systems are accused of copyright infringement under the same law. If charged and convicted of violation, violators face fines of up to $150,000.

Conclusions

Every person or corporation that plans to create a new system must do extensive research first and foremost. It's important to find out whether the same or a portion of the system is used in other countries, such as the United Kingdom or the United States. Thus, there will be less opportunity for the system or concepts to be based on the present one. Several websites have been released by the UK government, which may be used to verify if the system or concept exists inside the system. In addition, the UKIPO has released IPSUM, a tool for verifying if an idea or innovation already exists. The amount of patent rights violations may be reduced by obtaining a licence to utilise an idea or innovation from the person who came up with it.

The patent owner's rights are safeguarded under IPSUM, and any use of an idea from the system is subject to obtaining the necessary permissions in advance. Every organisation should have a standard security - related policy in place to guard against computer abuse. The consequences of computer misuse should be made very apparent in these rules (Edwards, 2020). It's very risky for a business to keep all its data on a single server. It's critical to buy more than single server to better spread out your data and make it more secure.

Since it is the company's obligation to secure user data, it is recommended that they install several servers to ensure that in the event of an attack on one server, the original data can be quickly recovered on the other server. Server attackers throughout the world pose a threat to the data stored in the systems. When it comes to a potential data leak from a SQL injection or force assault, all system firms should be conscious of this threat. The 2018 Data Protection Act (DPA) protects against illegal data access through server attacks.

Safeguarding personal data from unwanted access is critical to the success of the 2018 Data Protection Act (DPA). Because of this, the corporation must come up with new ways to protect its data, such as blocking server assaults like SQL injection. The GDPR portion of the 2018 DPA ensures that users' permission to the processing of their data results in fair and legal data processing. Commissaries for GDPR have the responsibility of enforcing regulations and keeping tabs on data processing in accordance with the DPA of 2018.

The Federal Trade Commission (FTC) has set numerous standards for the processing of personal data in the United States. In accordance with one principle, all businesses must inform their consumers of their data collecting, usage, and sharing practises. Consent from customers is critical to ensuring that their personal information is protected. It's time for the corporation to implement network access control (NAC) in the server (Eze et al., 2020). This method inhibits server-side data eavesdropping. Only legitimate devices are authorised by NAC once it has verified that they are connected to the device. It is difficult for anyone attempting to compromise the network to do so.

The physical protection of devices and servers’ entails restricting access to computer buildings, rooms, and other data resources, as well as controlling who has physical access to such locations. Only authorised individuals should have access to the server. The pints should also be kept in private areas, where no one may reach them. Recommendation for use of a certain Copyright and patent systems in UK, US and worldwide to avoid unintentional copyrighting or utilising of other people's ideas are required by this firm to safeguard its own intellectual property.

When developing a new system, a corporation should determine whether the current system is included, or if the whole system or just a portion of the system exists. Supports the use of passwords and other forms of authentication to keep server data private and protect against unauthorised access. To ensure data integrity and availability, technologies like encryption software and physical network isolation should be used (Law et al., 2021).

References

Edwards, E. L. (2020). Future Law: Emerging Technology, Regulation and Ethics. Edinburgh University Press.

Elvy, S.-A. (2021). A Commercial Law of Privacy and Security for the Internet of Things. Cambridge University Press.

Eze, D. T., Speakman, D. L., & Onwubiko, D. C. (2020). ECCWS 2020 20th European Conference on Cyber Warfare and Security. Academic Conferences and publishing limited.

Law, K. M. Y., Ip, A. W. H., Gupta, B. B., & Geng, S. (2021). Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing. CRC Press.

Schreider, T. (2020). Cybersecurity Law, Standards and Regulations, 2nd Edition. Rothstein Publishing.

35% OFF
Get best price for your work
  • 54000+ Project Delivered
  • 500+ Experts 24*7 Online Help

offer valid for limited time only*

×