Contact us today!

FRS Pros Blog

Taking a Look at Wearable Technology in 2019

Taking a Look at Wearable Technology in 2019

Wearables have been on the market for quite some time, though the definition of them has certainly changed over the years. Wearables have become far more capable in the past decade, bringing with them a barrage of other issues that need to be addressed. Chief among them is how these devices should be regulated, and by whom.

Wearable Technology Has Been a Successful Mixed Bag

When you crunch the numbers, wearables have been an overwhelming success, and they are much appreciated by their consumers. The number of connected devices in the world was a modest 525 million in 2016, but it is expected to skyrocket to 1.1 billion by 2022. It’s estimated that 167 million smartwatches and wristbands will be shipped that same year.

It’s clear that wearable technology is a commercial success, giving those who research and create it more than enough reason to pursue its continued manufacturing, but there are major concerns regarding security that need to be addressed.

The Dangers of Data

Wearables present security risks that all businesses need to address. One example of wearable devices accidentally leaking data comes from a heat mapping feature of the Strava fitness application, which accidentally revealed the locations of classified military bases. Wearable devices are also not updated as frequently as other devices, meaning that they could be more likely to contribute to a DDoS attack as part of a botnet or provide hackers with an unsecured network access point.

It’s also important to consider that these devices tend to collect data. In many ways, the data collected by these devices can be considered disadvantageous to the user, so they will need to consider how the data could be used by any of their devices.

The Regulations that Have Been Put in Place (and Which Matter)

Any technology that makes a big enough splash is one that will eventually be subject to regulations. However, the governing bodies and organizations that would put these regulations in place might not be able to do so at any given time. Here are a few to consider:

The FD&C Act

The Federal Food, Drug, and Cosmetic Act doesn’t have any power of wearables--even medical devices--because they are defined as a “low-risk general wellness product.” Therefore, the manufacturer’s intended use of the device is what defines it as a medical device or not, meaning that devices that are put together by wearable manufacturers won’t be classified under this umbrella term according to the FD&C Act’s standards.


The Health Insurance Portability and Accountability Act protects the individual’s right to their health information. HIPAA provides many protections, but it doesn’t specifically cover wearable technology. Wearable manufacturers also aren’t touched by the secondary use of health data, which is the use of personal health information beyond the direct delivery of healthcare. Considering how all data is produced by a consumer and not a covered entity, the secondary use of health data doesn’t apply.

The FTC Act

The Federal Trade Commission can go after companies that are carrying out deceptive practices, including a failure to comply with a privacy policy. This covers entities that are covered and not covered by HIPAA, and the FTC Act dictates how non-covered entities handle their health information-related security practices. The FTC can also bring on legal action against these organizations who are careless with consumer information, whether it’s violated privacy rights or a failure to keep proper security measures.

The FTC has made its stance on wearables clear. In 2017, the FTC reported that few companies ever discuss their cross-device tracking practices in their privacy policies. Cross-device tracking can allow multiple devices to be associated with a single user by linking that user’s activities across the devices. Therefore, the FTC Act is probably one of the more effective ways of keeping wearable companies accountable for their actions.

What are your thoughts on these devices? Let us know in the comments.

Tip of the Week: Five Deliciously Useful Tips for ...
Poking at Spear Phishing

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Network Security Business Computing Productivity Privacy Internet Hackers Google User Tips Software Cloud Microsoft Business Management Hardware Computer Innovation Tech Term Efficiency Malware Data Backup Data Mobile Devices Hosted Solutions Smartphones Smartphone Office 365 Windows 10 Data Recovery Browser Cybersecurity IT Services Backup Windows Upgrade Internet of Things Email Gadgets Communication Android Workplace Tips Small Business IT Support Outsourced IT Apps Business Data Security Disaster Recovery Cybercrime Communications VoIP Phishing Ransomware Business Continuity Operating System Mobile Device Management Network OneNote Law Enforcement Users Saving Money Employer-Employee Relationship Server Information Cloud Computing Vulnerability Money Artificial Intelligence Alert IT Support Passwords Miscellaneous Blockchain Social Media Facebook Health Managed IT Services Virtualization Applications Microsoft Office Managed Service Wireless Chrome Spam Best Practice Collaboration Managed IT Services Automation Two-factor Authentication Hacking Windows 10 Managed Service Provider Save Money Computers Managed IT Router Unsupported Software Networking BYOD Google Drive App Word Holiday Bring Your Own Device Telephone Systems Tech Support Data Storage Password Information Technology Robot Politics Mobile Device Travel Windows 7 Shortcut Excel Business Technology File Sharing Audit The Internet of Things Fraud BDR VPN iPhone Meetings Hard Drive Display Data Protection Gmail Evernote User Error Cost Management Application IT Management Quick Tips Augmented Reality Budget Encryption Cortana WannaCry Wireless Technology Safety Commerce Data Loss Access Control Hosted Solution Data Management Conferencing Search Printing Avoiding Downtime Mobility Mobile Security Risk Management Productivity Patch Management Wireless Charging Google Docs Project Management Proactive IT Sports SaaS Google Assistant Devices Hybrid Cloud Wi-Fi Data Breach Touchscreen Telephony Government Update WiFi Amazon Specifications Downtime Virus Data Privacy Microsoft Word Humor Micrsosoft Windows 10s HBO Vendor Management Computer Care Nanotechnology Investment Screen Mirroring Uninterrupted Power Supply Gamification Keyboard Shortcuts Software as a Service 5G Sabotage Unified Threat Management Apple Accessory Personal Information Scam Virtual Assistant Sales E-Commerce Proactive Tablets Maintenance Business Intelligence Education Solid State Drive Samsung Root Cause Analysis Sync Testing ROI Emails Cast Memory Storage Human Resources Social Engineering Reputation Computer Fan Files Bandwidth FAQ YouTube Data storage PC Upgrades DDoS Computer Forensics Peripheral Edge History Alexa for Business Retail Payment Cards Websites Remote Computing Legal Recovery Chromebook NFL Co-Managed Services eWaste Digital Signage Hard Disk Drive Disaster Antivirus Camera Windows Server 2008 R2 Marketing Financial Payroll Identities Charger Employees Settings Paperless Office Management Ciminal IT Solutions Employee Data Theft Administrator Telephone Device Security Firewall Battery Security Cameras Language Transportation Streaming Media Adobe Projects Workers Laptop Mobile Office Instant Messaging Hacker Webinar Lithium-ion battery Legislation Vendor OneDrive Smartwatch Emergency Consultant PowerPoint Admin Private Cloud Gifts Break/Fix Computing Remote Monitoring Access Windows Ink Hyperlink Processor Point of Sale Comparison Machine Learning Going Green Social Entertainment Chromecast Identity Licensing Updates Touchpad Development IT solutions Identity Theft Outlook Employee-Employer Relationship Voice over Internet Protocol Server Maintenance Wireless Internet Microsoft Excel Saving Time IT budget iOS WIndows Server 2008 Credit Cards Medical IT App store Internet Exlporer Value Google Maps Wasting Time Spyware Benchmarks Office Relocation Managing Stress es USB Worker How To Books Twitter Video Games Experience Hiring/Firing Work/Life Balance PDF Virtual Reality Employer Employee Relationship Current Events Electronic Medical Records Mobile Computing Crowdsourcing Phone System Benefits Text Messaging Save Time Computer Accessories Flexibility Music Cache Smart Technology Office tips Training Monitors Advertising Thank You Compliance Scalability Analytics Television CrashOverride Printers Keyboard Company Culture Black Market Cleaning Congratulations Regulation End of Support Big Data HaaS Automobile