Contact us today!

FRS Pros Blog

Taking a Look at Wearable Technology in 2019

Taking a Look at Wearable Technology in 2019

Wearables have been on the market for quite some time, though the definition of them has certainly changed over the years. Wearables have become far more capable in the past decade, bringing with them a barrage of other issues that need to be addressed. Chief among them is how these devices should be regulated, and by whom.

Wearable Technology Has Been a Successful Mixed Bag

When you crunch the numbers, wearables have been an overwhelming success, and they are much appreciated by their consumers. The number of connected devices in the world was a modest 525 million in 2016, but it is expected to skyrocket to 1.1 billion by 2022. It’s estimated that 167 million smartwatches and wristbands will be shipped that same year.

It’s clear that wearable technology is a commercial success, giving those who research and create it more than enough reason to pursue its continued manufacturing, but there are major concerns regarding security that need to be addressed.

The Dangers of Data

Wearables present security risks that all businesses need to address. One example of wearable devices accidentally leaking data comes from a heat mapping feature of the Strava fitness application, which accidentally revealed the locations of classified military bases. Wearable devices are also not updated as frequently as other devices, meaning that they could be more likely to contribute to a DDoS attack as part of a botnet or provide hackers with an unsecured network access point.

It’s also important to consider that these devices tend to collect data. In many ways, the data collected by these devices can be considered disadvantageous to the user, so they will need to consider how the data could be used by any of their devices.

The Regulations that Have Been Put in Place (and Which Matter)

Any technology that makes a big enough splash is one that will eventually be subject to regulations. However, the governing bodies and organizations that would put these regulations in place might not be able to do so at any given time. Here are a few to consider:

The FD&C Act

The Federal Food, Drug, and Cosmetic Act doesn’t have any power of wearables--even medical devices--because they are defined as a “low-risk general wellness product.” Therefore, the manufacturer’s intended use of the device is what defines it as a medical device or not, meaning that devices that are put together by wearable manufacturers won’t be classified under this umbrella term according to the FD&C Act’s standards.


The Health Insurance Portability and Accountability Act protects the individual’s right to their health information. HIPAA provides many protections, but it doesn’t specifically cover wearable technology. Wearable manufacturers also aren’t touched by the secondary use of health data, which is the use of personal health information beyond the direct delivery of healthcare. Considering how all data is produced by a consumer and not a covered entity, the secondary use of health data doesn’t apply.

The FTC Act

The Federal Trade Commission can go after companies that are carrying out deceptive practices, including a failure to comply with a privacy policy. This covers entities that are covered and not covered by HIPAA, and the FTC Act dictates how non-covered entities handle their health information-related security practices. The FTC can also bring on legal action against these organizations who are careless with consumer information, whether it’s violated privacy rights or a failure to keep proper security measures.

The FTC has made its stance on wearables clear. In 2017, the FTC reported that few companies ever discuss their cross-device tracking practices in their privacy policies. Cross-device tracking can allow multiple devices to be associated with a single user by linking that user’s activities across the devices. Therefore, the FTC Act is probably one of the more effective ways of keeping wearable companies accountable for their actions.

What are your thoughts on these devices? Let us know in the comments.

Tip of the Week: Five Deliciously Useful Tips for ...
Poking at Spear Phishing


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, June 25 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Network Security Internet Privacy Business Computing Productivity Google User Tips Hackers Cloud Business Management Microsoft Software Tech Term Innovation Efficiency Mobile Devices Hardware Malware Data Backup Browser Computer Windows 10 Smartphone Data Recovery Hosted Solutions Data Smartphones Cybersecurity Office 365 IT Services Email Internet of Things Android Windows IT Support Outsourced IT Upgrade Apps Data Security Backup Communication Gadgets Workplace Tips Small Business Cybercrime Operating System VoIP Disaster Recovery Communications Network Business Continuity Phishing Saving Money Money Business Alert Server Law Enforcement Ransomware Mobile Device Management Vulnerability Employer-Employee Relationship Users Information Microsoft Office Artificial Intelligence Virtualization Managed IT Services Managed IT Services Passwords Miscellaneous Social Media Cloud Computing Spam IT Support Best Practice Automation Collaboration Applications Wireless Chrome Save Money Computers Bring Your Own Device Managed Service Provider Holiday Managed IT Information Technology Blockchain Unsupported Software Two-factor Authentication App Telephone Systems Tech Support Facebook Networking Health Router Word Google Drive OneNote Windows 10 Managed Service Audit Safety Printing Meetings Mobile Security Data Breach Data Protection Travel Budget Risk Management Government Google Assistant IT Management Wireless Technology Hybrid Cloud File Sharing Cost Management Excel Robot Fraud Augmented Reality BYOD Data Management WannaCry Commerce Wi-Fi Update Productivity The Internet of Things Evernote VPN iPhone User Error Shortcut Business Technology Politics Sports Proactive IT Cortana SaaS BDR Telephony Data Loss Password Conferencing Touchscreen Data Storage Quick Tips WiFi Hosted Solution Search Google Docs Project Management Mobile Device Application Hacking Avoiding Downtime Mobility Patch Management Wireless Charging Access Control Devices Encryption Gmail Updates Employee Comparison Unified Threat Management Private Cloud Telephone Licensing Files Security Cameras Investment Microsoft Excel IT budget Battery DDoS Projects Outlook Solid State Drive Social PowerPoint Admin Sabotage Google Maps Spyware Root Cause Analysis Hacker Recovery Touchpad Vendor OneDrive Credit Cards App store Emails Cast Disaster Going Green Microsoft Word Computer Fan Emergency Break/Fix Specifications Virus Upgrades Hyperlink Machine Learning ROI Point of Sale Identity Hard Disk Drive Wireless Internet Saving Time PC Apple Administrator Humor Employee-Employer Relationship Voice over Internet Protocol Marketing Entertainment Wasting Time Tablets Maintenance Streaming Media Medical IT Sales Proactive Identity Theft Lithium-ion battery Value IT Solutions Amazon Downtime Storage Social Engineering Office Personal Information Data Privacy Windows 7 Sync Gamification Keyboard Shortcuts Paperless Office Edge Access FAQ Webinar Accessory NFL eWaste Chromecast Software as a Service 5G Retail Websites Consultant Vendor Management Reputation Data storage Virtual Assistant E-Commerce Identities Remote Monitoring Scam History Hard Drive Display Remote Computing Memory Human Resources Smartwatch Ciminal Education Internet Exlporer Testing Charger IT solutions Computer Forensics Peripheral Device Security Bandwidth YouTube Data Theft Samsung iOS WIndows Server 2008 Settings Alexa for Business Payment Cards Legislation Language Uninterrupted Power Supply Chromebook Co-Managed Services Adobe Workers Financial Payroll Server Maintenance Camera Windows 10s Legal HBO Management Windows Ink Computer Care Nanotechnology Laptop Employees Gifts Computing Screen Mirroring Antivirus Transportation Advertising Computer Accessories Smart Technology Flexibility Music Instant Messaging Compliance Analytics End of Support HaaS Printers es Scalability Relocation Keyboard Black Market Cleaning Regulation Big Data Windows Server 2008 R2 Cache Automobile Thank You Managing Stress Twitter Training Monitors USB Worker PDF How To Books Congratulations Mobile Computing Television CrashOverride Hiring/Firing Video Games Experience Company Culture Virtual Reality Text Messaging Work/Life Balance Current Events Electronic Medical Records Crowdsourcing Employer Employee Relationship Benefits Phone System Save Time Office tips