{"id":1301,"date":"2019-08-06T16:29:31","date_gmt":"2019-08-06T16:29:31","guid":{"rendered":"http:\/\/davra.com\/?p=1301"},"modified":"2020-03-21T14:13:11","modified_gmt":"2020-03-21T14:13:11","slug":"data-ownership-and-your-iot-platform","status":"publish","type":"post","link":"https:\/\/davra.com\/data-ownership-and-your-iot-platform\/","title":{"rendered":"Data Ownership & Your IoT Platform"},"content":{"rendered":"\r\n\r\n\r\n\r\n\r\n

You’re fully invested in the IoT<\/a>. From controlling factories to monitoring site access, you feel right at home when you’re tying data streams to KPIs. Sadly, good data ownership policies aren’t quite as easy to master.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n

Your company owns the hardware and software solutions that power its connected computing projects. Naturally, you might believe you own the data too, but never take this for granted. Careless stewardship practices could expose your enterprise fantasies to dream-shattering liabilities.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n

Ownership in Distributed Computing<\/h2>\r\n\r\n\r\n\r\n

Digital asset ownership shares parallels with other forms of legal property possession. Two noteworthy examples are th<\/a>e<\/a> legal rights and practical powers associated with possessing data.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n

Think about what happens when your company creates a public-facing marketing website. As the owner of the domain name and server, you can control the data’s presentation, such as by posting or removing content. As the creator, you’re also entitled to any economic proceeds derived from the site. In short, you satisfy both the control and legal rights criteria.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n

A legitimate visitor to your site, on the other hand, can’t change the main banner or trademark your blog content. Even though they can retain copies of your site \u2014 and the data streams that feed it \u2014 in their browser, they don’t own the source.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n

Think Tracking Intangible Data Sounds Easy?<\/h2>\r\n\r\n\r\n\r\n

Establishing ownership of physical items is relatively easy. If your labeled lunch bag goes missing from the office fridge, for instance, you can usually straighten things out in short order. While there’s no accounting for devious coworkers who prefer your cooking to their own, mixups aren’t the end of the world.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n

Contrast this low-fuss lunchtime solution with the complexities of data stewardship. Determining who’s responsible for a file or database is much tougher than assigning an owner to more substantial assets. It’s almost as if everyone brought identical paper lunch bags and threw them in the fridge without labeling them.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n

Unlike whatever’s lurking in your coworkers’ midday meals, raw data is homogeneous and hard to decipher. To an ordinary human trying to impose order on a messy IoT architecture, a hex dump or a massive JSON configuration file might look like Greek, making it difficult to decide who should be in charge of the contents.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n

You won’t always have the leeway to examine files to determine their provenance either. As anyone who runs a medical enterprise knows, patient information and other sensitive data need to stay private throughout their lifecycles. This makes it harder to correct resource allocation mishaps after they occur \u2014 so perhaps you should invest in preventative measures.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n

Taking Charge of Information Ownership<\/h2>\r\n\r\n\r\n\r\n

Effective IT asset ownership incorporates a number of essential elements:<\/p>\r\n\r\n\r\n\r\n\r\n\r\n

Possession and Control<\/h2>\r\n\r\n\r\n\r\n

Is the party that possesses information always the one that owns it? It depends. For instance, maybe you provide IoT software as a service and routinely handle or process third-party information instead of generating your own. You can’t simply assume that your clients will be OK with you exposing such information to other entities or so-called trusted parties, such as IT consultants.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n

These kinds of situations are common, and they beget interesting implications. For one thing, the verbal contracts and informal understandings that work for smaller projects and one-off IT partnerships no longer suffice. Instead, any company that wants to retain full command over its data must fashion the control lines from tougher stuff \u2014 service agreements.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n

Good service agreements help you clarify the trickiest aspects of data sharing. They delineate exactly who should take responsibility for stewardship under specific circumstances, describe standard operating procedures and emergency response practices, and promote intellectual property rights. They also let your clients or users know what they can expect from your IoT solutions.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n

Legal Precedents and User-Generated Content<\/h2>\r\n\r\n\r\n\r\n

Although you can’t always control what someone else does with the data in their care, you can easily fall afoul of the law for choosing risky stewards. For instance, imagine it’s widely known that a particular company has suffered a lot of security breaches. You shouldn’t expect any courtroom sympathy when you get sued after that vendor loses your consumers’ data.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n

Without getting too deeply involved in the legalese, the key concepts to consider here are those of negligence and due diligence. When deciding whether it’s a good idea to enact a new data-handling regime, ask yourself:<\/p>\r\n\r\n\r\n\r\n\r\n\r\n

\u2022 Would someone knowledgeable in your industry reasonably adhere to certain data-safety precautions or professionally accepted best practices?<\/p>\r\n\r\n\r\n\r\n

\u2022 What do laws like the EU’s GDP<\/a>R<\/a> or the US’s HIPAA<\/a> say about your responsibilities as a data steward?<\/p>\r\n\r\n\r\n\r\n

\u2022 Do you have the necessary compliance frameworks in place to help you prove beyond a doubt that you took every possible action to safeguard your information?<\/p>\r\n\r\n\r\n\r\n

\u2022 Could a wronged consumer reasonably argue that you had knowledge of ownership-related vulnerabilities<\/a> yet failed to act?<\/p>\r\n\r\n\r\n\r\n

Although data privacy laws vary, one common thread is that most nations are moving towards and end-user-centric model. Instead of solely protecting corporate interests, lawmakers are working to safeguard consumers.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n

Ownership Within the Context of the IoT<\/h2>\r\n\r\n\r\n\r\n

Ownership is critically important in the IoT arena. Your network may not be globe-spanning quite yet, but it still represents a stunning diversity of parts that make stewardship all the more vital.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n

IoT implementations aren’t isolated islands. The IoT links to the cloud to share data, stay current and appease your cravings for mobile performance feedback. These potential security vulnerabilities suggest that maintaining firm ownership could ultimately determine whether you end up in the news for all the wrong reasons<\/a>.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n

Even if your data always stays in-house, you’ve opened your doors to third-party APIs, libraries and hardware components. These necessities of using an IoT platform might mean that your handle on the reins is looser than you presumed, but fear not. It’s not too late to divert your data ownership strategy from a ruinous path.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n

Rethink your IoT use cases to incorporate better ownership practices, and don’t forget about overhauling the underlying frameworks if needed. Positive data control should be a part of your IT culture at all levels. When it comes to your connected infrastructures, the Davra IoT Platform<\/a> is the logical place to start making changes that ought to be uniform.<\/p>\r\n

Author<\/h2>\r\n

Brian McGlynn, Davra, COO<\/p>\r\n

Connect on Linkedin<\/a><\/p>\r\n","protected":false},"excerpt":{"rendered":"

You’re fully invested in the IoT. From controlling factories to monitoring site access, you feel right at home when you’re tying data streams to KPIs. Sadly, good data ownership policies aren’t quite as easy to master. Your company owns the hardware and software solutions that power its connected computing projects. Naturally, you might believe you […]<\/p>\n","protected":false},"author":3,"featured_media":1802,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[1169,30,45],"yst_prominent_words":[1161,245,761,826,75,1159,1078,80,53,116,1167,1162,1160,1164,1068,1168,339,1163,1165,1166],"_links":{"self":[{"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/posts\/1301"}],"collection":[{"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/comments?post=1301"}],"version-history":[{"count":0,"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/posts\/1301\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/media\/1802"}],"wp:attachment":[{"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/media?parent=1301"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/categories?post=1301"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/tags?post=1301"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/davra.com\/wp-json\/wp\/v2\/yst_prominent_words?post=1301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}