Sorry, you need to enable JavaScript to visit this website.
Skip to main content

The Nilsson song “Everybody’s Talking” has withstood the test of time and now could refer to the host of smart household products that communicate with consumers – and often with each other. But are companies protecting the security of consumer information they collect or maintain? A May 2021 Executive Order directed the National Institute of Standards and Technology (NIST) – in coordination with the FTC and other agencies – to initiate two labeling efforts to educate consumers on the cybersecurity implications of Internet of Things devices and to consider safer consumer software development practices. Those are the topics on the table at a NIST virtual public workshop on September 14-15, 2021, and you’re invited to participate.

The Executive Order directs NIST to: 1) “identify IoT cybersecurity criteria for a consumer labeling program;” and 2) “identify secure software development practices or practices for a consumer software labeling program.” Under the Order, NIST will consider whether those programs “may be operated in conjunction with or modeled after any similar existing government programs consistent with applicable law.” The September workshop, Cybersecurity Labeling Programs for Consumers: Internet of Things Devices and Software, will feature panel discussions and presentations based on consumer software labeling position papers submitted to NIST and potential IoT baseline security criteria NIST shared in August.

Registration for the public workshop is free and you’ll have a chance to submit questions online during the sessions, but you must sign up in advance from the Register to Attend the Virtual Event link on NIST’s website.
 

 

0 Comments


It is your choice whether to submit a comment. If you do, you must create a user name, or we will not post your comment. The Federal Trade Commission Act authorizes this information collection for purposes of managing online comments. Comments and user names are part of the Federal Trade Commission’s (FTC) public records system, and user names also are part of the FTC’s computer user records system. We may routinely use these records as described in the FTC’s Privacy Act system notices. For more information on how the FTC handles information that we collect, please read our privacy policy.

The purpose of this blog and its comments section is to inform readers about Federal Trade Commission activity, and share information to help them avoid, report, and recover from fraud, scams, and bad business practices. Your thoughts, ideas, and concerns are welcome, and we encourage comments. But keep in mind, this is a moderated blog. We review all comments before they are posted, and we won’t post comments that don’t comply with our commenting policy. We expect commenters to treat each other and the blog writers with respect.

  • We won’t post off-topic comments, repeated identical comments, or comments that include sales pitches or promotions.
  • We won’t post comments that include vulgar messages, personal attacks by name, or offensive terms that target specific people or groups.
  • We won’t post threats, defamatory statements, or suggestions or encouragement of illegal activity.
  • We won’t post comments that include personal information, like Social Security numbers, account numbers, home addresses, and email addresses. To file a detailed report about a scam, go to ReportFraud.ftc.gov.

We don't edit comments to remove objectionable content, so please ensure that your comment contains none of the above. The comments posted on this blog become part of the public domain. To protect your privacy and the privacy of other people, please do not include personal information. Opinions in comments that appear in this blog belong to the individuals who expressed them. They do not belong to or represent views of the Federal Trade Commission.

More from the Business Blog

Get Business Blog updates