FB pixel

Privacy vulnerabilities introduced by reidentification in wearables

Privacy vulnerabilities introduced by reidentification in wearables
 

Wearables are excellent for the health care industry, industrial applications and personal use. However, these devices often collect biometrics and have demonstrated privacy vulnerabilities due to de-identification and reidentification of users. Increased attack surfaces mean higher susceptibility for smartwatches, biosensors or glucose meters. What can users and manufacturers do to protect their devices?

Finding solutions is necessary as the world gets more data and criminals become more sophisticated. In addition to thieves and hacks, the public must also be concerned about misuse by employers and other critical figures. While this information helps public health institutions, it could do more harm than good. How far can users go to protect their data?

Data and anonymity

Biometric capabilities in wearables uses biological data to track specific health metrics, such as heart rate or walking patterns. Some wearables could also rely on biometric identification — such as Face ID — to authenticate the current user. Manufacturers collect this information for trends and research and to improve the accuracy of their devices. De-identification is critical for protecting this information.

Companies can de-identify a device in several ways. The most reliable step may be anonymization, which removes any identifying information from the data. Aggregation combines users’ information with that of others to report trends, thus masking the information of individuals. Then, pseudonymization gives fake names to each person to protect their real identity.

While these tactics have merits, reidentification could compromise user privacy and security. Linkage attacks are a looming threat because a malicious actor could connect de-identified information with publicly available data to reidentify a person. While solutions to linkage attacks exist, researchers have found that nonnumerical sensitive information is vulnerable due to semantic relevance. Therefore, privacy protection is important for wearables.

Another threat for users is insider threats or people who should be trustworthy with the information. For instance, companies could discover de-identified health data and link it to one of their employees. Despite accidentally finding the data, the business owner uses it against the employee by reducing the company’s health insurance contribution.

Outside threats are another significant consideration. Data breaches could expose sensitive records regarding health identifiers, credit card numbers and other information shared with the manufacturer. Digital privacy company Array says 98 percent of Americans have information exposed on the internet, so people and companies must be more cautious when de-identifying data.

There’s also a chance the data ends up in the hands of stalkers or criminals. Stalkers could use data to track a person’s daily fitness routine and location, and criminals may corroborate de-identified information for targeted attacks. Users must also consider misuse by law enforcement. These instances raise questions about consent requirements and constitutionality.

Mitigation strategies for wearables

Protecting de-identified information and following privacy guidelines are critical to the integrity of wearables. Protection is also essential for compliance with the Health Insurance Portability and Accountability Act (HIPAA). Without it, companies could face penalties for mishandling user information. With that in mind, people have some control over their information, so what can users do to protect their data?

First, users should thoroughly inspect their wearable’s privacy settings and limit data sharing as much as possible. Location services are another helpful feature wearables users should turn off if it’s unnecessary to their goals. Most gadgets let the user customize what activity they track, so they should consider which options to toggle. For instance, research shows electrocardiograms (ECGS) risk reidentification, and are even used for biometric identity verification by companies like B-Secur, though people may overlook this aspect.

Manufacturers also have a responsibility to protect de-identified data and prevent reidentification. The first steps should include only collecting the information necessary for the intended purpose. In addition, wearable producers should also regularly delete their data and minimize the liability of data breaches if they occur. Transparent policies are necessary to inform users of their rights and demonstrate their data in action.

When wearable manufacturers de-identify data, they should follow expert guidelines to ensure compliance and user protection. For example, HIPAA sets de-identification standards for health information, such as expert determination and safe harbor. The latter requires removing identifiers like names, birth dates, phone numbers and other critical facets.

Protecting information also requires companies to protect their wearables with solid security measures. For de-identifying, manufacturers should encrypt data to thwart outside threats and protect users. With this method, wearable producers have more control over information and reduce risk if data breaches occur. Only authorized users can access the original data, making it useless to outside threats.

Manufacturers and wearable users share responsibility for regular software updates. Companies should devote time and resources to finding security vulnerabilities in privacy policies. Then, users should download these updates as soon as possible to protect their information from malicious actors.

Related Posts

Article Topics

 |   |   |   |   | 

Latest Biometrics News

 

Emerging biometrics markets draw a crowd

Biometrics startups and giant multinationals collide as each tries to navigate emerging markets in the most-read stories of the week…

 

Laxton to supply hundreds of biometric kits to Honduras under $1.9M UNDP contract

The United Nations Development Programme has selected Laxton to provide hundreds of Biometric Citizen Registration (BCR) kits for Honduras. The…

 

Leadership change at IBIA follows layoffs at Thales

A major leadership change has been kicked off at Thales Digital Identity & Security and the International Biometrics and Identity…

 

Reusable ID for AML acquired by global fintech as compliance costs rise

Global fintech platform iCapital has entered a definitive agreement to acquire U.S.-based Parallel Markets, which provides reusable identity tools for…

 

Services Australia to run Trust Exchange pilot with largest Australian bank

A pilot with Commonwealth Bank will test the Australian government’s digital identity exchange scheme, Trust Exchange (TEx), using digital medical…

 

COPPA changes specify children’s biometrics and government IDs for protection

The Federal Trade Commission (FTC) Thursday issued notice that it finalized substantial changes to the Children’s Online Privacy Protection Act…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events