Contact us today!

FRS Pros Blog

Taking a Look at Wearable Technology in 2019

Taking a Look at Wearable Technology in 2019

Wearables have been on the market for quite some time, though the definition of them has certainly changed over the years. Wearables have become far more capable in the past decade, bringing with them a barrage of other issues that need to be addressed. Chief among them is how these devices should be regulated, and by whom.

Wearable Technology Has Been a Successful Mixed Bag

When you crunch the numbers, wearables have been an overwhelming success, and they are much appreciated by their consumers. The number of connected devices in the world was a modest 525 million in 2016, but it is expected to skyrocket to 1.1 billion by 2022. It’s estimated that 167 million smartwatches and wristbands will be shipped that same year.

It’s clear that wearable technology is a commercial success, giving those who research and create it more than enough reason to pursue its continued manufacturing, but there are major concerns regarding security that need to be addressed.

The Dangers of Data

Wearables present security risks that all businesses need to address. One example of wearable devices accidentally leaking data comes from a heat mapping feature of the Strava fitness application, which accidentally revealed the locations of classified military bases. Wearable devices are also not updated as frequently as other devices, meaning that they could be more likely to contribute to a DDoS attack as part of a botnet or provide hackers with an unsecured network access point.

It’s also important to consider that these devices tend to collect data. In many ways, the data collected by these devices can be considered disadvantageous to the user, so they will need to consider how the data could be used by any of their devices.

The Regulations that Have Been Put in Place (and Which Matter)

Any technology that makes a big enough splash is one that will eventually be subject to regulations. However, the governing bodies and organizations that would put these regulations in place might not be able to do so at any given time. Here are a few to consider:

The FD&C Act

The Federal Food, Drug, and Cosmetic Act doesn’t have any power of wearables--even medical devices--because they are defined as a “low-risk general wellness product.” Therefore, the manufacturer’s intended use of the device is what defines it as a medical device or not, meaning that devices that are put together by wearable manufacturers won’t be classified under this umbrella term according to the FD&C Act’s standards.


The Health Insurance Portability and Accountability Act protects the individual’s right to their health information. HIPAA provides many protections, but it doesn’t specifically cover wearable technology. Wearable manufacturers also aren’t touched by the secondary use of health data, which is the use of personal health information beyond the direct delivery of healthcare. Considering how all data is produced by a consumer and not a covered entity, the secondary use of health data doesn’t apply.

The FTC Act

The Federal Trade Commission can go after companies that are carrying out deceptive practices, including a failure to comply with a privacy policy. This covers entities that are covered and not covered by HIPAA, and the FTC Act dictates how non-covered entities handle their health information-related security practices. The FTC can also bring on legal action against these organizations who are careless with consumer information, whether it’s violated privacy rights or a failure to keep proper security measures.

The FTC has made its stance on wearables clear. In 2017, the FTC reported that few companies ever discuss their cross-device tracking practices in their privacy policies. Cross-device tracking can allow multiple devices to be associated with a single user by linking that user’s activities across the devices. Therefore, the FTC Act is probably one of the more effective ways of keeping wearable companies accountable for their actions.

What are your thoughts on these devices? Let us know in the comments.

Tip of the Week: Five Deliciously Useful Tips for ...
Poking at Spear Phishing

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Privacy Internet Hackers User Tips Software Cloud Google Efficiency Microsoft Innovation Hardware Data Hosted Solutions Business Management Communication Email Computer Windows 10 Cybersecurity Smartphones Malware Tech Term IT Services Business Small Business Data Backup IT Support Mobile Devices Backup Disaster Recovery Workplace Tips Android Browser Upgrade Outsourced IT Smartphone Office 365 Data Recovery Collaboration Windows VoIP Internet of Things Gadgets Phishing Apps Users Communications Cloud Computing Data Security Cybercrime Business Continuity Ransomware Information Automation Network Saving Money Managed IT Services Passwords Miscellaneous Operating System Facebook Managed Service Mobile Device Management Microsoft Office Vulnerability Money Artificial Intelligence Alert OneNote Law Enforcement Social Media Server Employer-Employee Relationship Health Quick Tips Covid-19 Blockchain Wireless Two-factor Authentication Holiday Managed IT Services Networking Information Technology Mobile Device Virtualization IT Support Managed IT Applications Best Practice Spam Chrome Mobile Office Password Data Storage Retail Hacking Gmail Windows 10 Word Conferencing Windows 7 Save Money Computers Project Management Patch Management Managed Service Provider Bandwidth Data Breach BYOD Router Unsupported Software Augmented Reality Telephone Systems Tech Support App Google Drive Settings Access Control Printing Bring Your Own Device SaaS Battery Vendor Proactive IT HIPAA Evernote User Error Google Assistant Hybrid Cloud Touchscreen Risk Management Going Green Social WiFi Remote Workers Cortana Voice over Internet Protocol Government Data Loss Wi-Fi Robot Business Technology Audit Update Meetings The Internet of Things Google Docs Shortcut Software as a Service Data Protection Wireless Charging Politics Devices Hard Drive Display Budget VPN iPhone Human Resources BDR Wireless Technology Cost Management Data Management IT Management History Payment Cards Marketing Commerce Productivity WannaCry Travel File Sharing Application Sports Paperless Office Hosted Solution Excel Management Search Fraud Encryption Avoiding Downtime Mobility Safety Telephony Mobile Security Admin Internet Exlporer Remote Monitoring Virtual Private Network Storage Social Engineering OneDrive Smartwatch Private Cloud Sync PowerPoint Processor Regulations Compliance Edge Instant Messaging Hacker Compliance Break/Fix IT solutions Hosted Desktop FAQ Hyperlink eWaste Emergency Machine Learning Uninterrupted Power Supply Touchpad Fiber Optics Websites Identity Printers Development Telework NFL Wireless Internet Saving Time Identities Point of Sale Employee-Employer Relationship iOS WIndows Server 2008 Server Maintenance Remote Work Benchmarks Policy Ciminal Keyboard Medical IT Windows 10s HBO Smart Devices Charger Entertainment Value Wasting Time Device Security Amazon Downtime Screen Mirroring Humor Holidays Data Theft Identity Theft Data Privacy Computer Care Nanotechnology Micrsosoft Audits Gamification Keyboard Shortcuts DDoS Unified Threat Management Managed IT Service Legislation Language Office Files Investment Net Neutrality Adobe Workers Myths Procedure 5G Disaster Solid State Drive Sabotage Troubleshooting Personal Information Accessory Recovery Windows Ink Virtual Assistant E-Commerce Emails Cast Copiers Gifts Computing Vendor Management Root Cause Analysis Business Intelligence Solutions Memory Upgrades Managed Services Provider Comparison Scam Testing Computer Fan ROI Reputation Internet Service Provider Licensing Updates Administrator Data storage Threats Video Conferencing Microsoft Excel IT budget Education YouTube Hard Disk Drive PC CRM Outlook Computer Forensics Peripheral Printer Google Maps Spyware Alexa for Business Lithium-ion battery Inventory Credit Cards App store Samsung Chromebook Co-Managed Services Streaming Media Remote Computing Digital Signage Financial Payroll Facebook Privacy Specifications Virus Camera Windows Server 2008 R2 Microsoft Word Access Scams Organization Employees IT Solutions AI Legal Firewall PCI DSS Apple Employee Webinar Antivirus Telephone Chromecast Security Cameras Consultant Laptop eCommerce Sales Proactive Projects Training Transportation Workstation Tablets Maintenance Advertising Smart Technology Flexibility Music Television CrashOverride Company Culture Scalability Analytics End of Support Regulation HaaS Black Market Cleaning Relocation Automobile Big Data Managing Stress Twitter USB Worker Books PDF How To Hiring/Firing Mobile Computing Video Games Experience Virtual Reality Work/Life Balance Current Events Electronic Medical Records Thank You Text Messaging Crowdsourcing Employer Employee Relationship Cache Benefits es Phone System Save Time Communitications Congratulations Office tips Computer Accessories Monitors