Internet of things – Need for a new legal environment?

Internet of things – Need for a new legal environment?

computer law & security review 25 (2009) 522–527 available at www.sciencedirect.com www.compseconline.com/publications/prodclaw.htm Internet of thi...

153KB Sizes 0 Downloads 57 Views

computer law & security review 25 (2009) 522–527

available at www.sciencedirect.com

www.compseconline.com/publications/prodclaw.htm

Internet of things – Need for a new legal environment? Rolf H. Weber a,b a b

University of Zurich, Switzerland University of Hong Kong, China

abstract Keywords:

The Internet of Things as an emerging global, Internet-based information service archi-

Internet of Things (IoT)

tecture facilitating the exchange of goods in global supply chain networks is developing on

ONS and DNS

the technical basis of the present Domain Name System; drivers are private actors.

European Regulatory IoT-Initiatives

Learning from the experiences with the ‘‘traditional’’ Internet governance it is important to

Root System

tackle the relevant issues of a regulatory framework from the beginning; in particular, the

Self-Regulation

implementation of an independently managed decentralized multiple-root system and the

Governance Principles for the IoT

establishment of basic governance principles (such as transparency and accountability, legitimacy of institutional bodies, inclusion of civil society) are to be envisaged. ª 2009 Prof. Rolf H. Weber. Published by Elsevier Ltd. All rights reserved.

1. Notion and concept of the internet of things In the ongoing process of Internet growth a new development is on its way, namely the evolution from a network of interconnected computers to a network of interconnected objects (Internet of Things, IoT)1.

1.1.

about, among other things, goods in global supply chain networks, i.e. the IT-infrastructure should provide information about ‘‘things’’ in a secure and reliable manner.4 Extending the initial application scope, the IoT might also serve as backbone for ubiquitous computing, enabling smart environments to recognize and identify objects, and retrieve information from the Internet to facilitate their adaptive functionality.5

Notion of IoT 1.2.

The term IoT, first used by Kevin Ashton in a presentation in 19982, describes an emerging global, Internet-based information service architecture. Technically, the architecture is based on data communication tools, primarily RFID-tagged items (Radio Frequency Identification).3 The purpose of the IoT consists in the facilitation of information exchanges 1

Technical background of IoT

The most popular industry proposal for the new IT-infrastructure of the IoT is based on an Electronic Product Code (EPC). In the respective network, established by EPCglobal and GS1,6 the ‘‘things’’ are physical objects carrying RFID tags with a unique EPC; the infrastructure can offer and query EPC

I would like to thank my research assistant Ulrike I. Heinrich for her valuable support in the preparation of this article. See Gerald Santucci, Paper for the International Conference on Future Trends of the Internet, From Internet of Data to Internet of Things, at p. 2, available at: ftp://ftp.cordis.europa.eu/pub/fp7/ict/docs/enet/20090128-speech-iot-conference-lux_en.pdf. 3 RFID is a technology used to identify, track and locate assets; the universal, unique identification of individual items through the EPC is encoded in an inexpensive RFID tag. 4 For general overviews of the technical background of the IoT see Christian Floerkemeier/Marc Langheinrich/Elgar Fleisch/Friedemann Mattern/Sanjay E. Sarma (eds), The Internet of Things, Berlin/Heidelberg 2008; Lu Yan/Yan Zhang/Laurence T. Yang/Huansheng Ning (eds), The Internet of Things, New York/London 2008. 5 See in general Benjamin Fabian, Secure Name Services for the Internet of Things, Thesis, Berlin 2008, at p.1. 6 See http://www.epcglobalinc.org. 0267-3649/$ – see front matter ª 2009 Prof. Rolf H. Weber. Published by Elsevier Ltd. All rights reserved. doi:10.1016/j.clsr.2009.09.002 2

computer law & security review 25 (2009) 522–527

Information Services (EPCIS) both locally and remotely to subscribers.7 Instead of saving all information on a RFID tag, however, a supply of the information by distributed servers on the Internet is achievable through linking and cross-linking with the help of an Object Naming Service (ONS).8 The ONS does not contain actual data about the EPC, but it can return a list of network accessible service endpoints that pertain to the EPC in question.9 The ONS is authoritative (linking metadata and services) in the sense that the entity having – centralized – change control over the information about the EPC is the same entity that assigned the EPC to the concerned item.10 The central ONS root is operated by the (private) company VeriSign, a provider of Internet infrastructure services.

1.3.

ONS and DNS heritage

The ONS is based on the well-known Domain Name System (DNS), i.e. the DNS-based ONS as hierarchical tree-like architecture11 locates the information sources relevant for a given object. Technically, in order to use the DNS to find information about an item, the item’s EPC must be converted into a format that the DNS can understand, which is the typical, ‘‘dot’’ delimited, left to right form of all domain names.12 Since the main design idea is to first encode the EPC into a syntactically correct domain name and then to use the existing DNS infrastructure to query for additional information, it can be said that the ONS is a subset of the DNS.13 The ONS and the DNS have the following similarities:  Structure: Based on the distributed DNS-tree both the ONS and the DNS are grounded on the same database structure.  Service architecture: Both the ONS and DNS use the architectural client-server model and the same Internet communication protocols.

523

a few technical limits, e.g. each label can contain up to 63 octets, but the whole domain name may not exceed 255 octets. The ONS uses the Tag Data Standard, a deterministic choice based on the EPC structure.14  Use models: The DNS is based on an extensible and multipurpose Internet-based public infrastructure; the ONS uses a private infrastructure that is specific to RFID-related business activities/partners. Since ONS is based on DNS use,15 it will also inherit all of the well-documented DNS weaknesses. For example, DNS suffers from limited redundancy in practical implementations.16 Furthermore, the small number of servers for a given zone information and their limited redundancy create single points (or small areas) of failure. In addition, root and top-level domain (TLD) servers might suffer from strong load imbalance induced by the architecture. In a nutshell, the DNS weaknesses in robustness, configuration complexity and security need to be overcome if the IoT should become a reliable system. Apart from the technical issues, governance aspects remain crucial. Criticism has been levied against ICANN as governing body of the (traditional) Internet, for example in respect of the ‘‘thin’’ legitimacy and the lack of sufficient transparency and accountability.17 The same question arises in the IoT environment; who should reasonably control and operate the root and TLD servers? Since the IoT is not only a mere extension of today’s Internet, but rather a complex netting of independent but interoperable systems, implemented in a symbiosis with new services and different modes of communication, the traditional Internet Governance concepts are not anymore suitable to identically be applied, but the development of decentralized architectures and the promotion of a shared network of multistakeholderism governance for the IoT is needed.

The following differences are given between the ONS and the DNS:

2.  Standardisation processes and bodies: The ONS uses the standards development process by EPCglobal, a user driven standards process for the development of technical standards whereas DNS applies the RFC (Requests for Comments) series, a standardisation process published by the Internet Engineering Task Force (IETF).  Naming schemes: The domain names in the DNS usually consist of two or more alphanumeric parts (labels) with only 7

FABIAN, supra note 5, at p. 30/31; to the details of the service orientation and the context-aware computing see Davy Preuveneers/Yolande Berbers, Internet of Things: A ContextAwareness Perspective, in Yan/Zhang/Yang/Ning, supra note 4, at p. 288, 296 ss. 8 Fabian, supra note 5, at p. 33. 9 EPCglobal, Object Naming Service (ONS) Version 1.0.1, para 4.2, available at: http://www.epcglobalinc.org/standards/ons/ons_1_ 0_1-standard-20080529.pdf. 10 EPCglobal, Object Naming Service (ONS) Version 1.0.1, supra note 9, at para 4.2. 11 Fabian, supra note 5, at p. 33. 12 EPCglobal, Object Naming Service (ONS) Version 1.0.1, supra note 9, at para 5.2. 13 Fabian, supra note 5, at p. 36 refers to a ‘‘secondary dependence’’.

EU-activities

The need to tackle regulatory issues of the IoT governance has been recognized by the EU Commission already in 2006, particularly at the occasion of a workshop entitled ‘‘From RFID to the Internet of Things18. Comparatively, the EU efforts in studying the regulatory needs for the IoT are further advanced than the efforts of any other institutional body.

2.1.

Staff paper and replies

(i) As its further contribution to the increasing public debate and for reaching mutual understanding about the IoT and its relationship towards the future Internet the EU 14

Fabian, supra note 5, at p. 37. To the DNS in general see Rolf H. Weber, Looking ahead: more harmonization in the domain name system? International Journal for Intercultural Information Management 2007, at p. 74 ss. 16 See also Fabian, supra note 5, at p. 50. 17 To the respective discussion extensively Rolf H. Weber, Shaping Internet Governance: Regulatory Challenges, Zurich 2009, at p. 105 ss. 18 See ftp://ftp.cordis.europa.eu/pub/ist/docs/ka4/au_conf670306_ buckley_en.pdf (final report). 15

524

computer law & security review 25 (2009) 522–527

Commission published a Staff Working Document19 on the early challenges regarding the ‘‘Internet of Things’’, dated 29 September 2008. In particular, the following issues have been addressed in this document: development and importance of the IoT, architecture of RFID applications as a first example of the IoT and policy challenges in RFID architectures and specifically regarding the IoT, such as security, privacy, data protection, control of critical global resources, subsidiarity, identity management, naming, interoperability, fostering innovation, spectrum and standardisation. Amongst others, policy issues to be discussed in this context include raising awareness among all stakeholders, reducing entry barriers to IoT technologies/services and guaranteeing individuals’ fundamental rights regarding privacy, protection of personal data and consumer protection. Emphasizing its ambition to play a leading role in the development of the IoT, the EU Commission invited all concerned stakeholders to send comments on the issues addressed therein. (ii) Following the Commission’s appeal, 36 responses with further comments and propositions were handed in from individuals, non-governmental organizations, other associations and private companies20. Amongst the delivered replies it is noteworthy to point to the following papers:  ANEC/BEUC: The joint answer of ANEC, the European Association for the Coordination of Consumer Representation in Standardisation, and the European Consumer’s Organization BEUC to the consultation, dated 27 November 2008, replies from a consumer’s point of view.21 ANEC/BEUC’s paper outlines a list of principles being essential to the future development of the IoT including openness, interoperability, neutrality, trust, transparency, protection of privacy and fundamental rights, security, user control, representativeness, respect of European values, liability, accountability, respect of the environment, health/safety and reliability. ANEC and BEUC support the Commission in highlighting privacy and data protection as the major challenges of the developing IoT. Though, in their opinion self-regulation is not the best way to achieve guidance22 since not enough pressure on industry and/or other parties to comply with high standards is given.23 ANEC and BEUC criticize the term ‘‘Internet of

Things’’ (IoT) as being misleading since the IoT is not only linking things but also natural persons, and request the Commission to additionally address issues like increasing energy consumption, risks related to the expansion of electromagnetic fields, potential ethical risks and ‘‘the right to the silence of the chip’’.24  Amcham EU: In its response, dated 28 November 2009,25 the American Chamber of Commerce to the European Union (Amcham EU), representing American companies acting in Europe, considers the release of IoT rules as premature. Referring to the Commission’s standpoint that the IoT might carry a potential for identification and profiling of individuals, Amcham EU is of the opinion that a discussion on the aspects of privacy and security is highly speculative at this stage,26 since the IoT is still in its infancy and forecasts towards the IoT’s development cannot be made. Amcham EU criticizes the Commission’s strong focus on RFID technology conveying the impression that RFID is the dominating technology governing the IoT and thereby limiting the development and potential contribution of IoT enabling technologies other than RFID.27 Amcham EU also requests the Commission to await further developments of the IoT before laying down rules by taking a technology neutral framework approach.28  EPCglobal: In its response, dated 28 November 2008,29 EPCglobal criticizes the Commission’s conclusions as being an incomplete analysis of the concept of IoT unilaterally based on RFID. Considering the moment to make policy decisions on the future of the IoT as premature, the organization recommends the Commission to carefully assess today’s Internet technology and the future technological, economic and societal developments30 for ascertaining the issues which need guidance. From EPCglobal’s point of view, the fundamental rights of individuals to privacy and data protection are already well established by the European legislation. Within its response EPCglobal like Ancham EU recommends the Commission to take a technology neutral approach to the IoT31. Being of the opinion that services in the IoT will not be regional or national but global, EPCglobal requests the Commission to encourage a comprehensive dialogue representing all stakeholders.

24

Ibid. at p 5. Amcham EU, Response to ‘‘Internet of Things’’ Public Consultation, available at http://www.eucommittee.be/Pops/ 2008/DEC_Internet%20of%20Things%2028112008.pdf. 26 Amcham EU, Response to ‘‘Internet of Things’’ Public Consultation, supra note 25, at p. 7. 27 Ibid. at p. 4. 28 Ibid. 29 EPCglobal, Response to the EU Commission Staff Working Document: Future Networks and the Internet – Early Challenges regarding the ‘‘Internet of Things’’, available at: http://ec.europa. eu/information_society/policy/rfid/documents/c_epcglobal.pdf. 30 EPCglobal, Response to the EU Commission Staff Working Document, supra note 29, at p. 2. 31 Ibid. 25

19 Commission Staff Working Document, Future Networks and the Internet – Early Challenges regarding the ‘‘Internet of Things’’, available at: http://ec.europa.eu/information_society/ eeurope/i2010/docs/future_internet/swp_internet_things.pdf. 20 Santucci, supra note 2, at p. 10. 21 Joint ANEC/BEUC answer to the consultation, available at http://ec.europa.eu/information_ society/policy/rfid/documents/ c_anec_beuc.pdf. 22 In addition, more experience should be gained from the application (Joint ANEC/BEUC answer to the consultation, supra note 21, at p. 4). 23 Joint ANEC/BEUC answer to the consultation; supra note 21 at p. 6.

computer law & security review 25 (2009) 522–527

 EuroCommerce: EuroCommerce, an association for retail, wholesale and international trade interests, agrees in its position paper, dated 28 November 2008,32 with the Commission’s position regarding self-regulation which (contrary to ANEC/BEUC) is considered to be the best way to properly implement data protection legislation in the whole value chain by leaving users’ flexibility for adapting to the rapidly evolving RFID technology and its applications.33 Appreciating the Commission’s Staff Working Document as being a starting point for an important discussion34 the association criticizes the limited and unilateral analysis of the IoT and highlights the need for a broader analysis of the IoT’s huge potential. Being of the opinion that the current privacy and data legislation is sufficient,35 EuroCommerce requests the Commission to explicitly assess the current legal framework before making new policy decisions for the future IoT36 and invites the Commission to convene an annual Internet of Things summit for evaluating all IoT-developments.  Afilias: Regardless of the Commission’s Staff Working document Afilias, a large provider of global domain name registry services supporting over 14 million domains across 15 top-level domains37, published a White Paper on ‘‘Finding your Way in the Internet of Things‘‘ in September 2008.38 Afilias therein submits an architectural approach to ONS for creating a decentralized and interoperable IoT root system focusing on five main issues,39 namely identifier collusions, backward compatibility, unilateral control authority, assurance of practicality, openness to competition in the provision of services and setting of priorities towards trust/security. Using the example of supply chains Afilias proposes an ONS model with local control and global interoperability, notwithstanding the fact, that the IoT will be broader than just supply chain elements thereof.

2.2.

EU communication of June 2009

In its Communication of 18 June 2009 on the ‘‘Internet of Things – An action plan for Europe’’40 the EU Commission expresses the opinion that the development of IoT cannot be left to the private sector and to other world regions, but that European legislators would have a responsibility for public policy issues which could not be shirked towards civil society. In particular, the governance of the IoT should be designed and exercised in a coherent manner with all public policy activities related to Internet governance. As far as specific IoT aspects are concerned, the EU Commission raises questions 32 EuroCommerce Position Paper, available at http://ec.europa. eu/information_society/policy/rfid/documents/c_eurocommerce. pdf. 33 EuroCommerce Position Paper, supra note 32, at p. 3. 34 Ibid. 35 EuroCommerce Position Paper, supra note 32, at p. 4. 36 Ibid. at p. 3. 37 See http://www.afilias.info/. 38 Afilias White Paper, available at http://www.afilias.info/ webfm_send/11. 39 Afilias White Paper, supra note 38, at p.2. 40 COM (2009) 278 final.

525

related to the object naming, the assigning authority, the addressing mechanism and information repository, the security, the accountability mechanism and the legal framework. Subsequently, the EU Commission defines 14 lines of actions as follows: (1) Governance: A set of principles underlying the governance of IoT and an architecture with a sufficient level of decentralized management are to be developed. (2) Continuous monitoring of the privacy and the protection of personal data questions: RFID applications are to be operated in compliance with privacy and data protection principles. (3) The ‘‘silence of the chips’’: Individuals should be able to disconnect from their networked environment at any time. (4) Identification of emerging risks: A policy framework enabling IoT to meet the challenges related to trust, acceptance and security needs to be worked out. (5) IoT as a vital resource to economy and society: Aspects such as standardisation and protection of critical information infrastructures are to be tackled. (6) Standards Mandate: The EU Commission announces to assess the extent to which existing standards mandates can include further issues related to IoT or launch additional mandates if necessary. (7) Research and Development: IoT needs to become a key topic in the ongoing FP7 research projects. (8) Public-Private Partnership: The IoT should become an additional part of the envisaged setting-up of publicprivate partnerships. (9) Innovation and pilot projects: The EU Commission considers promoting the deployment of IoT applications by launching specific pilot projects. (10) Institutional Awareness: Through increased information flow to European institutions awareness about IoT development should be improved. (11) International dialogue: The EU Commission envisages intensifying the dialogues on all IoT aspects with its international partners. (12) RFID in recycling lines: The EU Commission intends to launch a study assessing the possibility that the presence of tags can have on the recycling of objects. (13) Measuring the uptake: Information on the use of RFID technologies should allow one to identify their degree of penetration and the assessment of their impact on the economy and the society. (14) Assessment of evolution: The EU Commission envisages putting a multi-stakeholder mechanism in place at the European level to monitor the IoT evolution and the necessity of implementing further measures. The publication of the Action Plan has not caused major reactions; the implementation of the EU principles by the concerned industry remains to be observed.

3. Regulatory challenges of the IoT – lessons from the internet Being still in its infancy the IoT’s development, particularly regarding its future extent, is hardly predictable. Nevertheless,

526

computer law & security review 25 (2009) 522–527

a preliminary assessment of the current environment regarding the Internet’s structure (root system), institutional issues and governance principles is desirable.

3.1.

Structural aspects (root system)

The currently used Internet model, maintained by the Internet Corporation of Assigned Names and Numbers (ICANN), a USdomiciled private entity, is hierarchically structured as a single authoritative root with complete interoperability based on common standards. In this context, two issues merit further elaboration, namely the question whether a single- or a multi-root architecture would be preferable and the question of the governing bodies’ legitimacy.41 In light of the fact that the concentration of the de jure control over the root name space in the hands of a single non-governmental entity is subject to constant criticism42, since, for example, a unique root does not meet geopolitical concerns, structural changes are of fundamental importance. Even if no single server would contain the complete ONS directory and if each server would be responsible for one or more domains but no two servers for the same domain, a fully centralized root system does not seem to be appropriate.43 Therefore, an independently managed decentralized multiple-root system being interoperable and covering data in a distributed way needs to be developed for the future IoT, although multiple identifier authorities imply a significant and sustained effort of global cooperation44. The implementation of a multi-root system does not exclude that a close corporation between EPCglobal/GS1 and the domain name registries is applied; by sharing experiences and by putting together combined efforts it should be possible to realized better and more stable solutions. In the past, major objections have addressed the lack of an adequate democratic and legitimized background which would be required for an entity such as ICANN, that plays the sort of role commonly adopted by public entities. Questions on democratic legitimacy arise in particular due to the fact that its techniques of representation are deemed to be unsatisfactory, since they do not actually reflect the whole of the Internet community within the organizational structures.45 Consequently, the aspect of legitimacy should become a specific governance principle;46 therefore, in particular European scholars call for a root system on a regional basis.47

3.2.

Institutional issues

As already mentioned, the development of the Internet has been driven by the private sector. In view of the fact that the 41

See also above no. 1.2. See Fabian, supra note 5, at p. 50. 43 In general see Weber, supra note 17, at p. 60 ss; for the IoT context see Bernard Benhamou, A European Governance Perspective on the Object Naming Service, Governance of Resources, at p. 268, available at: ftp://ftp.cordis.europa.eu/pub/ fp7/ict/docs/ch1-lisbon-20071215_en.pdf; see also Fabian, supra note 5, at p. 38/39. 44 Santucci, supra note 2, at p. 18. 45 Weber, supra note 17, at p. 62/63. 46 See also below no. 3.2. 47 Benhamou, supra note 43, at p. 269. 42

Internet has evolved into a global facility, the IoT’s international management should be with the full support by all, i.e. the governments, the private sector, civil society and international organizations48 and not under the control of one single organization. An IoT being within a specific public or private authority’s power would hence increase the lack of legitimacy and democratic participation. In contrast, the system should be designed in a way that the rules are fair, are firmly rooted in a framework of formal requirements about how rules are made as well as are correspondingly interpreted and applied. Including all stakeholders concerned with the IoT in one way or the other generally ensures a form of reasonable representation, being an important aspect when considering the legitimacy of institutions.49 The stakeholders’ co-action, enhanced communication, coordination and cooperation in a kind of forum, frame a central institutional point for the regulation of IoT issues, allowing for participation and dialogue. The future IoT, consequently, needs a multipolar and decentralized policy institutional setting considering the needs of all stakeholders involved, managed by several entities.50

3.3.

Governance principles

Governance plays an important role in the implementation of international network structures. Experiences from the regulation of the Internet give the lesson that the concept of ‘‘multi-stakeholder in governance’’ should be perceived as the new way forward in favor of the inclusion of the whole of society. Such a development challenges the traditional legal and political understanding of legitimacy and makes it necessary to tackle the general question of who could be a legitimate stakeholder. Consequently, architectural principles are to be developed and compiled in an international legal framework; representation only has a legitimizing effect, if the outcome reflects the values of the represented stakeholders. In particular, such a comprehension calls for procedures that establish equal bargaining powers and fair proceedings, as well as enhanced transparency and review mechanisms which enable the allocation of accountability.51 Transparency and non-discriminatory access promote the mobilization of civil society and influence the architectural and constitutional principles of a regime, such as flexibility and openness. The achievement of a greater degree of clarity and predictability also fosters the stability of legal framework.52 Transparent minimum quality standards enhance the IoT’s conditions and the assessment of performance and accountability, as well as facilitate the coordination of governance related regulations. Transparent procedures allow for a certain level of ‘‘democratic’’ legitimization and predictability through 48 Tunis Agenda for the Information Society, November 2005, para 29, available at: http://www.itu.int/wsis/docs2/tunis/off/ 6rev1.html. 49 Weber, supra note 17, at p. 102. 50 For more details see Fabian, supra note 5, at p. 48 ss, 60; from a political point of view Benhamou, supra note 43, at p. 269. 51 Weber, supra note 17, at p. 268. 52 For more details see Weber, supra note 17, at p. 121 ss with further references.

computer law & security review 25 (2009) 522–527

active involvement of citizens as well as through certain control over the decision-making processes.53 Accountability is regularly called for to improve the governance regimes of organizations. Even if multi-stakeholderism leads the diverse constitutions of the accountees and therefore accountability mechanisms should reflect the different particularities in the various segments of civil society, accountability in the IoT governance would improve if standards are harmonized in a way which makes governing bodies accountable, at least at the organizational level;54 accountability-holders must also be able to impose some sort of sanction in case of non-compliance with accountability criteria. Standards could help implement legitimizing structures and a guideline for governance principles.55 Civil society must be included in the decision-making processes related to governance issues. Inputs from civil society have to be taken into account and reasons need to be given if the governing bodies diverge from the opinion of the public. The inclusiveness and quality of governance could be improved and the effective participation of more stakeholders would be facilitated by adequate participatory processes.56 Rules which serve as a benchmark for public participation, access to information and transparency in IoT governance as well as the building of a common understanding of the respective principles and their practice, help to design a democratic environment.57 A further substantial governance principle in the implementation of the IoT encompasses security and confidentiality. Similar questions are already known from the ‘‘traditional’’ Internet, however, these aspects are even more central in the realization of the IoT.58 Scholars express concerns under technical points of view, advocating for better

53

Ibid. at p. 269. Ibid. at p. 132 ss with further references. 55 ibid. at p. 269. 56 Ibid. at p. 148 ss with further references. 57 Ibid. at p. 269. 58 See Benjamin Fabian/Oliver Gu¨nther/Sarah Spiekermann, Security Analysis of the Object Name Service, at p. 1 ss, available at: http://lasecwww.epfl.ch/~gavoine/download/papers/FabianGS2005-sptpuc.pdf. 59 Fabian, supra note 5, at p. 37 ss and 41 ss. 54

527

security environments and higher confidentiality standards.59 A particularly important aspect in the context of the IoT concerns privacy and data protection.60 So far, these security aspects are not sufficiently taken into account in the design of the IoT, in particular since typical ONS users are more demanding than classical DNS users in terms of access control and privacy. Furthermore, the use of RFID tags allows following the tracks of movements exercised by users of IoT services. A specific need for an improvement of data protection regimes is obvious.61 Prof. Dr. Rolf H. Weber ([email protected]) is professor at the University of Zurich and a visiting professor at the University of Hong Kong. Rolf H. Weber studied at the University of Zurich and at the Harvard Law School. Since 1995 he is ordinary professor at the University of Zurich and a visiting professor at the University of Hong Kong, teaching and publishing in civil, commercial and European law with special topics in Internet, media and competition law, international finance and trade regulation. He is director of the European Law Institute and the Center for Information and Communication Law at the University of Zurich; in addition he is member of the directory of the Postgraduate Studies in International Business Law and the MBA-Program at the University of Zurich. Since 2008 Prof. Dr. Rolf H. Weber is member of the Steering Committee of the Global Internet Governance Academic Network (GigaNet) and since 2009 he is member of the High-level Panel of Advisers of the Global Alliance for Information and Communication Technologies and Development (GAID). Besides, he is engaged as an attorney-at-law and as a member of the editorial board of several Swiss and international legal periodicals.

60

See, for example Viola Schmid, Radio Frequency Identification Law Beyond 2007, in: Floerkemeier/Langheinrich/Fleisch/Mattern/Sarma, supra note 4, at p. 196 ss; Benjamin Fabian/Oliver Gu¨nther, Distributed ONS and its Impact on Privacy, at p. 1223 ss, available at: http://ieeexplore.ieee.org/stamp/stamp. jsp?arnumber ¼ 04288878. 61 Since the privacy issues related to the IoT are so important and substantial, the author will address this in a second paper entitled: ‘Internet of Things – New security and privacy challenges?’ to appear in the following issue of the Journal.